As the U.S. outlines new rules for driverless car development and safety, Chinese researchers uncover vulnerabilities that can be exploited from 12 miles away.
Apple's exclusive bug bounty program is one that federal agencies -- particularly the most risk-averse -- could embrace.
Although states have strengthened their defenses against hackers and cybercriminals who attack their computer networks, officials admit they’re not fully prepared for increasingly complex threats that could expose the personal information of their residents.
HHS' low-cost, open-source 2FA solution protects users who connect to GrantSolutions.gov -- and is poised to do even more.
The real emphasis, according to Assistant Secretary of Cybersecurity and Communications Andy Ozment, should be on building in cybersecurity "from the get-go" on the next generation of systems.
Although cybersecurity is being woven into the fabric of government, it’s not appropriately funded, a new survey from NASCIO and Deloitte finds.
The state plans to engage technology vendors to help businesses and state agencies use blockchain technology to distribute, share, and save ledgers and contracts.
Organizations are not monitoring data movement in the most vulnerable places, a new McAfee Labs Threats Report suggests.
Because the scope of the cybersecurity challenge is expanding, it requires developing skills for solving tomorrow's issues.
Officials are urging state and local governments to leverage resources from the Department of Homeland Security to better secure election systems from cyberthreats.
Preparing for a cloud security incident will ensure that both government and cloud provider IT teams can respond quickly and effectively in a crisis.
Experts at a cybersecurity workshop said that increased automation and built-in security are increasingly necessary, especially as the Internet of Things gains traction.