The Intelligence Community's research agency is exploring the use of role-based virtual environments to enhance security.
Recipients of the Cybersecurity Public Service Scholarship Program must work for the state after graduation for the number of years that they received the scholarship.
Rather than focus on attacks from the outside, organizations should concentrate on the internal networks, data and risks within their control.
The policyspeak of a DEF CON "Meet the Feds" panel put some hackers to sleep, but one attendee was glad to learn of the government’s work on IoT and software security.
The Cyber Independent Testing Lab will evaluate the security of commercial software so that users and purchasers can make quantitative comparisons among different products.
For most agencies, a combination of security products create a formidable defense.
Because it’s not possible to scale up the cybersecurity talent pool fast enough to address escalating threats, artificial intelligence approaches to cybersecurity automation provide a highly desirable solution.
To make the cloud more secure, IT teams must adopt a proactive, real-time approach to protecting it, taking advantage of agile software development and better monitoring capabilities.
Government agencies, particularly state and local ones, are under attack by hackers who are using a combination of malware, phishing and social engineering to wring money from their public-sector victims.
Criminals are getting better at what they do and upping the ante by attacking larger agencies and demanding more money.
The Department of Health and Human Services announces funding opportunities for an information sharing and analysis organization to improve cybersecurity in the health care sector.
The Immigration and Customs Enforcement forensics lab has beefed up its equipment and travel document library to better fight foreign terrorism.