New guidance provides tactical and strategic advice for cyber event recovery planning.
As smart cities start investing in connected devices, there is arguably a much broader threat vector from botnets taking advantage of the unsecured Internet of Things.
Pulling together quantum-resistant cryptography will take time, and NIST feels that, unless it starts now, that new cryptography won’t be ready.
The steady growth in state and local government IT spending will continue, as agencies look to replace legacy systems and protect against cyber threats, a recent report says.
With thousands of new modifications, the lucrative malware is not going away any time soon.
By protecting sensitive data, training staff to recognize threats and building a reliable response plan, agencies can ensure that a ransomware attack won’t create the ultimate crisis.
The blockchain can become the city’s operating system, invisible yet ubiquitous, improving citizens’ access to services, goods and economic opportunities.
A standardized and repeatable process for the IT department and the program managers allows for advice, guidance and review of security and privacy at every step of the process.
We can strengthen cyber deterrence by improving cybersecurity, employing active defenses and establishing international norms for cyberspace.
Red Hat's platform is FIPS 140-2-certified for nine of its modules, making it a secure, open-source operating system.
Automation can give developers confidence in open-source components’ security, licensing and quality.
Biometric data capture, ID verification and algorithmic intelligence technologies will enhance the coverage, responsiveness and flexibility of border protection efforts.