This year’s Cyber Grand Challenge will be the first all-computer hacking tournament where machines will try to find and fix bugs in real time.
Market forces and the fear of liability may ultimately make the voluntary guidelines the de facto standard for public- and private-sector cybersecurity.
A much-improved version of the cryptographic building block lacks FIPS 140-2 validation, but SafeLogic is stepping in to change that.
Software developed by Duke University researchers lets users of camera-equipped devices specify what others can see, preventing inadvertent disclosure of restricted information.
The Department of Health and Human Services is looking for ideas on how blockchain can be used to address privacy, security and scalability challenges of managing electronic health records and resources.
Chief information security officers listen to hundreds of company pitches for security tools and solutions every year, a new report finds.
Combining the basics of good IT hygiene with the powerful and unprecedented protection of today’s operating systems and processors ensures that agencies will meet the security demands of the modern, mobile workforce.
Identity analytics offer a more efficient way to prevent and investigate fraud.
There's one more week to make your nominations for the GCN dig IT Awards -- so please help us showcase the best examples of discovery and innovation in government IT.
West Point has partnered with a small Silicon Valley startup to give cadets a chance to learn from network security professionals.
Even computer systems equipped with recommended cybersecurity technology can't detect all threats, which explains why a cybersecurity startup found malware on San Antonio's mass transit computer systems.
The nomination deadline has been extended to July 21 -- here's how to make yours count!