The blockchain can become the city’s operating system, invisible yet ubiquitous, improving citizens’ access to services, goods and economic opportunities.
A standardized and repeatable process for the IT department and the program managers allows for advice, guidance and review of security and privacy at every step of the process.
We can strengthen cyber deterrence by improving cybersecurity, employing active defenses and establishing international norms for cyberspace.
Red Hat's platform is FIPS 140-2-certified for nine of its modules, making it a secure, open-source operating system.
Automation can give developers confidence in open-source components’ security, licensing and quality.
Biometric data capture, ID verification and algorithmic intelligence technologies will enhance the coverage, responsiveness and flexibility of border protection efforts.
Maryland used Virtru Pro to ensure email is encrypted before it’s sent, making it compliant with requirements of the Health Insurance Portability and Accountability Act and Criminal Justice Information Services.
Hacks of phone-based fingerprint readers and facial recognition software underscore the need for multifactor identification.
By addressing weaknesses in human factors, agencies can reduce their attack surface and make every employee a soldier in the battle against cyberattacks.
Cities are looking for open and secure solutions to help enable smart city development, according to a new report from IDC.
To highlight the nation's biggest and most urgent cybersecurity issues, a new 100-page report calls for an all-hands-on-deck approach to addressing cyber risks.
McAfee’s annual report on the cybersecurity landscape holds some tips for government IT managers.