Agencies that can streamline and secure their internal document management processes are better able to protect their assets.
Immediate actions will help agencies protect the health of their systems, but they must also address their long-term vulnerabilities.
Without measurement criteria, the pilots will be of limited use in planning and implementing a social media screening program, the agency watchdog says.
The WikiLeaks release of alleged CIA hacking program data shows why insider threats are still the biggest cybersecurity danger to the government and the private sector.
D-Wave will work with Virginia Tech to train its staff, faculty and affiliates in the intelligence and defense communities to build new applications and software tools for its quantum computers.
The Defense Department's maintenance and supply-chain challenges have made it a leader in additive manufacturing, but the next major hurdle will be ensuring that the technology is secure.
State’s Diplomatic Security Bureau wants to determine the current market capabilities and price points for either a smartphone or tablet-based solution.
Playbooks help agencies automate and standardize the security process so analysts can focus on decision making and problem solving.
To measurably reduce cyber vulnerability, state and local governments must interact regularly with fusion centers and encourage more private companies to share information.
Communications by government officials in California who use personal devices or email accounts to conduct official business may be subject to disclosure under the California Public Record Acts.
The State Cyber Resiliency Act would set up a grant program to help develop and implement cyber resiliency plans and build a stronger cybersecurity workforce.
Logistical issues are slowing down efforts to integrate biometric exit systems, according to a new Government Accountability Office report.