The independent federal commission that helps states improve their voting systems wants more clarity on what DHS' critical infrastructure designation means.
Beyond ensuring overall network security, government cybersecurity specialists have several ways of locking down a smartphone.
Officials in Livingston County, Mich., turned to a machine learning tool that can find anomalies in user and device behaviors without previous knowledge of what to look for.
At the National Governors Association winter meeting, Govs. Terry McAuliffe and Brian Sandoval both spoke about opportunities for the federal and state governments to work together and across the aisle.
Temporal Defense Systems plans to use the D-Wave 2000Q to solve complex cybersecurity problems affecting governments and commercial enterprises.
Instead of repeating the same guidelines and recommendations of the past, it’s time to take a new and unconventional look at our approach to technology and how we secure it.
As a man famously reluctant to use computers, President Donald Trump must lead a government that is ever more reliant on technology for service delivery and national security.
The Login.gov shared authentication platform allows individuals with personal accounts to access government services and gives participating agencies the option of using the platform as a shared service.
As the volume of alerts continues to increase, eliminating false positives and developing new methods of handling them will become increasingly critical.
The National Institute of Standards and Technology is looking for tools to facilitate the security, reliability and privacy of clusters of networked Internet of Things devices.
The Boston Police Department is going back to the drawing board to redefine a system that can help it analyze social media content.
Cybersecurity teams must understand what happened during a breach in order to prevent it from happening again.