Recent disruptions in legacy 911 emergency-response systems point up the urgent need for new technology, but few states or localities can afford the upgrades.
Combining a password management program with a chipped Universal Second Factor key can create very strong passwords that users don’t need to memorize.
The National Geospatial-Intelligence Agency wants the flexibility to tear down its cloud architecture and rebuild it every day so that would-be attackers confront a confusing operating environment.
Members of the House Committee on Oversight and Government Reform questioned the FBI over its use of facial recognition technology.
Moving the point of mitigation from the data center to the cloud platform offloads the responsibility from an agency’s IT staff to that of the cloud provider and offers several other advantages.
Based on the IBM Cloud, the new service gives enterprises a way to experiment with the distributed ledger technology.
A scalable, secure data exchange ecosystem can support high-quality research while safeguarding against breaches of sensitive patient data.
More transparency, better law enforcement and a more robust engagement among the cyber superpowers can mitigate against the worst cybersecurity risks and reduce the influence of catalytic actors.
Local elections officials are struggling with maintaining and protecting their election systems, despite offers of help from the Department of Homeland Security.
Fundamental issues relating to domestic and foreign cybersecurity threats were discussed by experts at the recent RSA Conference.
Agencies that can streamline and secure their internal document management processes are better able to protect their assets.
Immediate actions will help agencies protect the health of their systems, but they must also address their long-term vulnerabilities.