In the face of tight technology budgets, the intelligence community will focus on cyber security, research and workforce development, said Stephanie O'Sullivan of ODNI.
Cyber warfare is here and if we don't shift the way we think and strengthen our defenses, we will pay the price down the line, writes Jim Flyzik.
The High Orbit Ion Canon, easy enough for a user of any skill level, unleashes powerful DDOS attacks that can be hard to detect and stop.
The most common passwords are also the most obvious, which makes them the easiest to crack, according to SplashData's annual list. It doesn't have to be that way.
The Metasploit Framework can be used for good or ill, but its purpose is to give the good guys the same tools the bad guys are already using.
Two-stage DIA protocol preps documents to move at 'moment's notice' across separate security domains.
A secure, bare-bones operating system designed strictly for industrial systems could protect critical infrastructure, the founder of the Russian company says.
The theft of $400,000 from a Burlington, Wash., account handling employee payroll and some citizen payments comes on the heels of warnings that U.S. banks were being targeted.
Flaws in the voter databases in Mayland and Washington state would allow hackers to effectively prevent people from voting, the New York Times reports.
Our new look highlights analysis and commentary on the latest technology, tools and tactics in public sector IT.
Wholesale migrations aren't expected soon, but IT managers say there are several ways the new OS could start slipping in through the side doors.
An innovative cryptographic scheme does away with trusted third parties to protect stored and scrambled passwords on separate servers.