Researchers are developing algorithms that can detect when malware uses adversarial machine learning to attack networks and evade detection.
Defending against phishing attacks involves a combination of policies, procedures and controls.
Despite privacy concerns, many officials envision people using digital licenses not only for traffic stops and airport ID but also in bars, banks, doctor’s offices and as voter ID at polling places.
The National Institute of Standards and Technology recently issued a practice guide showing two ways federal employees using mobile devices could be authenticated to access secure information systems and applications.
Even with government and industry working on quantum-resistant encryption, getting any solutions rolled out will take time and a massive effort.
Besides protecting systems from automated attacks, agencies must also guard against data being physically removed from the building.
Government should step in to ensure facial recognition technology is developed without biases, experts say.
A holistic approach that tears down the traditional silos of backup and recovery, security and infrastructure management will ensure the security of data in the cloud.
The Business Software Alliance is crafting a framework to help policymakers develop rules and legislation around software security.
Although most of the focus of bring-your-own-device policies has been on security, agencies must also ensure their networks continue to operate efficiently in the midst of the growing mobile use.
The Morris worm set the stage for the crucial, and potentially devastating, vulnerabilities in what has been called the coming internet of everything.
The West Virginia Secretary of State estimates 144 voters in 30 different countries used the app to cast secure, anonymous ballots.