The cyber maneuver technology would randomize configurations and other aspects of a network to fool and foil intruders.
Senators' claims that critical infrastructure is vulnerable to a "few keystrokes" belie its resilience and obscure the real threats.
Esri's GIS public information maps will be made accessible on Microsoft's cloud-based disaster portal.
With troop drawdowns in Afghanistan, the Army will use computerized surveillance technology to improve perimeter security and help protect small units in remote outposts.
The NSA's chief says attacks on U.S. critical infrastructure increased 17-fold in two years, while Iran's nuclear program continues to be a target.
Phishing is the most common attack used against federal networks, so it's important to be aware of the latest techniques, even if they seem unlikely.
Office of Naval Research’s “network bridging system” moves data instantaneously between the combat system and the command and control network.
Smart meters have an optical port that, if attacked, can let someone change the way they operate, a researcher says at Black Hat.
This year's Black Hat Briefings will tackle OS security — or lack of it — in Windows and iOS. Mobile devices and industrial control systems get a lot of attention, too.
Alaska’s Enterprise Technology Services team used a unified computing system to quickly move existing services to a new data center, and validated its disaster recovery approach and failover capabilities in the process.
A public/private pilot program is taking a close-up look at harmful algae in Lake Erie by processing data retrieved from space.
Alabama’s Next Generation program plans to move all 911 traffic to an IP network over the next 18 months, paving the way for text, video and photos with emergency calls.
The FCC and Transportation Department are working to establish a transition path to the next generation of 911 services.
The NASA Earth Exchange lets scientists build in hours Landsat-based Earth models that used to take months.
Sen. Lieberman introduces cybersecurity bill that offers limited liability for sharing threat information and emphasizes continuous monitoring of government IT systems.