The Defense Digital Service proves that bug-bounty programs can pay big dividends for government agencies.
An aggressive push for improved authentication has resulted in savings, standardization and safer data.
Indiana CIO Dewand Neely discusses his state's data analytics practice and its new approach to workforce cybersecurity training.
Organizational flexibility, encryption and automation will help network administrators better manage security as data centers shrink.
Los Angeles’ Integrated Security Operations Center consolidates all departmental cybersecurity into one central system.
In response to the threat of foreign interference in U.S. elections, 18 states have asked the Department of Homeland Security for advice on how to protect voting technology from cyber tampering.
The technology that underpins the Bitcoin crytocurrency has the potential to power all sorts of innovative government services.
The static networks of old aren’t built to address evolving threats. They must be replaced by highly portable and distributed networks that can anticipate the next potential threat.
A Science and Technology Directorate research project proves that reducing the risk of third-party applications is not such a remote possibility.
A Tripwire study also found that 88 percent of IT professionals think such hacks would pose a threat to public safety.
As the U.S. outlines new rules for driverless car development and safety, Chinese researchers uncover vulnerabilities that can be exploited from 12 miles away.
Apple's exclusive bug bounty program is one that federal agencies -- particularly the most risk-averse -- could embrace.