Government health care institutions and agencies can safeguard their confidential information and lower their risk of data breaches by following best practices around people, encryption and security policies.
States are taking the lead, but are they equipped to address the complex issues of cybersecurity?
Seeing the tremendous value of personal information on the average tax return, cyber criminals are hitting the IRS, the Department of Education and many businesses in hopes of stealing tax records and data.
The IRS might be outgunned in the fight against tax fraud.
DARPA is building a secure network that aims to operate without power or internet connectivity across disparate IT networks and grid infrastructure technologies.
A more effective machine-to-machine threat information sharing language and platform should speed adoption across industry.
Technology that monitors how users interact with their devices has been demonstrated by various performers, a DHS cyber expert says.
By leveraging automation and analysis tools, government security operations centers can effectively face the new landscape of cyber threats.
An insecure IT supply chain can present as much risk to agencies as an insider exfiltrating data, according to security experts.
Safeguarding an agency against email compromise involves both administrative awareness and technical controls, such as email rules, filtering and third-party solutions.
Even with security researchers looking for an Android variant of the iOS spyware, the sophisticated program designed to surveil specific targets managed to hide itself.
Agencies’ different interests in threat tracking, mitigation and prosecution can make it difficult for them to share information related to cyber attacks.