In the wake of the Mirai botnet attack, cybersecurity experts discuss issues with securing the Internet of Things.
Effective risk management and decision making is about being able to translate the conversation from what’s happening with the technology to how it impacts the mission.
Cities have taken the lead on sensor systems, but experts say the federal potential is immense -- if security improves sufficiently.
The National Institute of Standards and Technology is looking for a better way for secure laptops in patrol cars.
The Los Angeles Integrated Security Operations Center consolidates more than 200 million log records from across 41 departments every 24 hours.
Even extensive training is unlikely to transform ordinary workers into hyper-vigilant phishing detectives.
The Intelligence Advanced Research Projects Activity is looking for a virtual user environment that can support the kind of security analytics required to protect sensitive government users or workloads.
Travis County, Texas, is working to combine the convenience of electronic voting and the record of paper ballots into one system.
To stay ahead of adversaries, federal IT decision makers must step back from their day-to-day routines and prioritize their vulnerabilities.
With more government services facing potential cyberthreats, the Department of Homeland Security is working to lower the risk and impact of potential telephone system-based attacks on 911 call centers.
A new report outlines a range of vulnerabilities, infiltration points and tactics that could be used to undermine credibility in an election or even manipulate the results.
Updates to A-130 make continuous privacy and vulnerability monitoring responsibilities of every agency.