Here are five technologies the new administration should keep on the presidential blotter.
An international organization is being formed with members including the DOD, DHS and NSA to coordinate the development of critical controls for cybersecurity and promote their use by government and industry.
NIST's software test suite helps to assure that biometric applications conform to NIST standards for the exchange of biometric data.
In the face of tight technology budgets, the intelligence community will focus on cyber security, research and workforce development, said Stephanie O'Sullivan of ODNI.
Cyber warfare is here and if we don't shift the way we think and strengthen our defenses, we will pay the price down the line, writes Jim Flyzik.
The High Orbit Ion Canon, easy enough for a user of any skill level, unleashes powerful DDOS attacks that can be hard to detect and stop.
The most common passwords are also the most obvious, which makes them the easiest to crack, according to SplashData's annual list. It doesn't have to be that way.
The Metasploit Framework can be used for good or ill, but its purpose is to give the good guys the same tools the bad guys are already using.
Two-stage DIA protocol preps documents to move at 'moment's notice' across separate security domains.
A secure, bare-bones operating system designed strictly for industrial systems could protect critical infrastructure, the founder of the Russian company says.
The theft of $400,000 from a Burlington, Wash., account handling employee payroll and some citizen payments comes on the heels of warnings that U.S. banks were being targeted.
Flaws in the voter databases in Mayland and Washington state would allow hackers to effectively prevent people from voting, the New York Times reports.