The Los Angeles Integrated Security Operations Center consolidates more than 200 million log records from across 41 departments every 24 hours.
Even extensive training is unlikely to transform ordinary workers into hyper-vigilant phishing detectives.
The Intelligence Advanced Research Projects Activity is looking for a virtual user environment that can support the kind of security analytics required to protect sensitive government users or workloads.
Travis County, Texas, is working to combine the convenience of electronic voting and the record of paper ballots into one system.
To stay ahead of adversaries, federal IT decision makers must step back from their day-to-day routines and prioritize their vulnerabilities.
With more government services facing potential cyberthreats, the Department of Homeland Security is working to lower the risk and impact of potential telephone system-based attacks on 911 call centers.
A new report outlines a range of vulnerabilities, infiltration points and tactics that could be used to undermine credibility in an election or even manipulate the results.
Updates to A-130 make continuous privacy and vulnerability monitoring responsibilities of every agency.
The Barnstable Police Department thwarts ransomware attacks with technology that more frequently and inexpensively copies and stores its data.
Gov. Terry McAuliffe said he wants other states to follow Virginia’s lead in cybersecurity.
Public safety agencies are turning off their radio encryption over concerns of not being heard by nearby departments using older devices.
The former CIA and NSA director discusses Russia's recent hacks of Democratic party emails as well as Apple's stand against the FBI over encryption.