The National Institute of Standards and Technology's latest draft of the RMF advises IT managers to integrate supply chain risk into their overall risk management outlook.
To address elections vulnerabilities, best security practices must be applied across the board – from voter registration systems to tabulation machines.
Polygraphs may offer some confidence that a person is telling the truth about a particular incident, but so far, there's no 100 percent reliable physical sign of telling a lie.
A new report from Deloitte outlines six factors for government agencies interested in starting a blockchain pilot.
A confluence of technological and cultural shifts happening right now are re-establishing SOCs as the most exciting and strategic place to work in government cybersecurity.
Election officials says they're focused putting contingency plans in place so voting can continue even if digital systems are disrupted.
USB-C chargers can allow criminals to attack the computer of an unsuspecting user who is just trying to power up the device’s battery.
Researchers at Lawrence Berkeley National Laboratory have developed a relatively inexpensive method for on-the-fly detection of attacks on power grids.
The government's plea agreement with the three teens who built the Mirai botnet is providing investigators with insider tools and knowledge.
The theft of CPU power to mine cryptocurrencies does more than siphon off agency resources -- it also opens the door for more malware to affect machines and networks.
Today’s hyperconverged networks demand a comprehensive range of encryption solutions to secure data-at-rest and data-in-motion across agencies.
Smart cities can increase security with a networking strategy that continually aligns the end-to-end architecture with business goals.