With today’s war games, teams with competing interests get a chance to practice the coordination and collaboration they need to meet changes with effective response.
Analysis of scans of internet-connected devices show unsecured connected assets across government and other sectors supporting critical infrastructure.
State election officials are making plans to tighten security all along the voting chain -- from voter registration to machine integrity and audit trails -- with help from the Department of Homeland Security under the new critical infrastructure designation.
Any weak link breached by ransom-seeking hackers can also be exploited by bad actors with more malicious goals.
An inspector general’s report identified problems at NASA that are no doubt familiar to IT managers at large organizations working keep IT and operational technology systems secure.
If Trump administration staff members are using an app that deletes messages after they are read, they may be in violation of records preservation rules.
The Department of Homeland Security’s booth will feature 12 government-funded solutions that are ready for pilot deployment and commercialization.
Amid all the security solutions and compliance standards, the most effective tool is decidedly low tech.
A new security solution lets government agencies share data via cryptographically secure containers.
The risk-based approach of the Continuous Diagnostics and Mitigation program shifts cybersecurity from solely a technical issue to an everyday business priority.
Technically, state and local governments can buy tools and services from the Department of Homeland Security’s Continuous Diagnostics and Mitigation program, but few have jumped on board.
National Telecommunications and Information Administration’s working groups made initial presentations on securing the internet of things.