A survey of Black Hat 2015 attendees reveals a disparity between “the threats that keep security professionals awake at night and the tasks that keep them occupied during the day.”
Customs and Border Protection will collect fingerprints and passport information and compare it to the same data that was collected when the traveler arrived in the United States.
Platform analytics can provide state and local governments with both proactive detection and defensive threat mitigation -- and the information learned can be shared across departments.
Data loss prevention solutions monitor the network for leaks from endpoint devices such as USBs, printers and mobile devices.
Lessons from a digital-government pioneer on how to think about providing better citizen service.
An effective cybersecurity plan must not just address the problems outlined in the 30-day cybersecurity sprint, but also the underlying issues that have kept agencies from fully complying with existing security programs.
The New Jersey Cybersecurity and Communications Integration Cell hopes to detect attacks aimed at banking institutions with the help of shared threat intelligence.
States increasingly are employing facial recognition software to compare driver’s license or ID photos with other images on file.
Vencore Labs’ SecureSMART solution helps utilities detect early signs of attacks on wireless networks and validate security controls in the electric grid.
Louisiana Tech and the University of San Diego have launched programs to support public-private cybersecurity research and build a cyber-savvy workforce.
The key to enhancing mobile security is combining a secure digital identity with a second authentication factor such as a PIN or fingerprint to let employees use their devices to authenticate themselves for physical and digital access.
The Office of Personnel Management warned that anyone who has submitted to a background check since 2000 is likely at risk — as are some of the family and associates listed on their applications.