Data loss prevention solutions monitor the network for leaks from endpoint devices such as USBs, printers and mobile devices.
Lessons from a digital-government pioneer on how to think about providing better citizen service.
An effective cybersecurity plan must not just address the problems outlined in the 30-day cybersecurity sprint, but also the underlying issues that have kept agencies from fully complying with existing security programs.
The New Jersey Cybersecurity and Communications Integration Cell hopes to detect attacks aimed at banking institutions with the help of shared threat intelligence.
States increasingly are employing facial recognition software to compare driver’s license or ID photos with other images on file.
Vencore Labs’ SecureSMART solution helps utilities detect early signs of attacks on wireless networks and validate security controls in the electric grid.
Louisiana Tech and the University of San Diego have launched programs to support public-private cybersecurity research and build a cyber-savvy workforce.
The key to enhancing mobile security is combining a secure digital identity with a second authentication factor such as a PIN or fingerprint to let employees use their devices to authenticate themselves for physical and digital access.
The Office of Personnel Management warned that anyone who has submitted to a background check since 2000 is likely at risk — as are some of the family and associates listed on their applications.
The U.S. Computer Emergency Readiness Team collaborates with other federal agencies and industry to quickly disseminate cyber threat alerts.
Following recent cyber breaches, U.S. CIO Tony Scott ordered a cybersecurity sprint to rapidly evaluate problem areas. As that 30-day dash comes to a close, experts weigh in on the likely outcomes.
The Department of Homeland Security expands its FedVTE program, giving state, local, tribal and territorial government employees free access to cybersecurity training.