Attacks are growing more sophisticated, and stolen digital certificates are now part of the malware package.
Whether immediate and destructive or slow and insidious, cyber attacks are aimed at weakening U.S. capabilities on the battlefield and at the negotiation table.
Privacy concerns regarding information sharing are misplaced. What investigators need to see is threat intelligence, not personally identifiable information.
A new study compares the cybersecurity posture of different levels of government.
Cyber Innovation Challenge seeks a way to visualize the risks associated with the networks and assets supporting a given mission.
Federal CIO Tony Scott announced the Cybersecurity Strategy and Implementation Plan, alongside updated FISMA guidance, all aimed at improving Uncle Sam's cybersecurity posture in months and years to come.
Some states make it impossible to use a child’s Social Security number and other identifying information to establish credit, and in Utah parents can have their child’s identifying information monitored by the state.
By better understanding how cyberattacks work and applying that knowledge appropriately, organizations can better prepare for inevitable hacks.
The National Geospatial Intelligence Agency is looking for capabilities to bolster authentication and track activity across its virtual networks.
Unlike perimeter-based security, virtualized network security allows for segmenting the data center, firewalling off various sensitive areas without the need for external hardware.
The Rhode Island Cybersecurity Commission evaluated the state's cybersecurity infrastructure and made recommendations to enhance the resiliency of operations in executive branch agencies.
Open source technologies combine distributed peer review and transparency, which speeds innovation and lowers costs.