A new platform by startup Claroty examines network traffic using an inspection engine designed for critical infrastructure's IC systems.
Experts are still dialing for dollars when it comes to ideas for how to mitigate the risk, or even the impact, of a potential telephony denial-of-service attack on the 911 emergency services system.
A recent study revealed how easy it would be for bad actors to overload and disable infrastructure for the 911 emergency services in the United States.
The future of online voting will depend on the federal government’s ability to work with states to enact uniform standards for voting protocols that include a verifiable voting method voters can trust.
A new ID card reader promises to ease the process for authenticating and securing access for mobile users, making it easier to manage remote employees.
Fusion centers and local law enforcement communities still face challenges accessing decentralized databases and classified data.
Although USB “drop attacks” have served as a well-known hacker exploit, a recent study shows that the scheme remains effective even among security-aware populations.
At a ransomware workshop hosted by the Federal Trade Commission, panelists advised increased cyber hygiene, patching and backups.
Attendees at a privacy workshop agreed that the National Institute of Standards and Technology's privacy guidance needs improvement.
Because state and local governments collect and store vast amounts of personal data, they are prime targets for cyberattacks.
Defense of cyber-physical systems requires multidisciplinary collaboration to address their inherent vulnerabilities.
Agencies must manage and monitor their privileged accounts and users with access to sensitive data.