Move to IP-based services would keep up with how people communicate, and could be cheaper than maintaining the current system.
Social media tools can get the news on a disaster out fast, but the possibiity of inaccurate information calls their usefulness into question.
Although most government employees and contractors have cards, agencies seldom use them for network access and still don't trust cards issued by other agencies, the Government Accountability Office says in a recent report.
An Urban Institute study finds that cameras have helped lower crime rates in some areas but not others. Why the different results?
An international working group's road map sets a goal of a hardened, resilient energy delivery system capable of surviving cyberattacks by 2020.
The newly approved IEEE 2030 standard for Smart Grid interoperability provides foundational guidance for developing the technology and equipment that will make up the world’s next generation electricity distribution and delivery systems.
Execs at a closed-door discussion agree: You've probably already been breached by a sophisticated attack, or will be soon.
Researchers have developed software, called SUMMIT, that allows different disaster models and simulations to share data to create a real-time picture.
When moving to the cloud, plan, plan and plan. And ask your vendor the right questions, says CBP's Wolf Tombe.
LifeNet, developed at the Georgia Institute of Technology, links smart phones and other portable devices in the field from a single device.
A Japanese air traffic controller with access to sensitive flight information posted some details about President Barack Obama’s flight plans in a blog post.
It can be surprisingly easy to shut down part of the power grid — and we don't need an enemy to do it — but there’s some good news, too.
John Breeden II confronts his thoughts and fears from that day and invites others to share theirs.
When contractors and mobile users connect devices to the secure systems of critical infrastructure providers, they potentially open a loophole for malicious software.
Leaders of the Senate Judiciary Committee say Obama administration proposals to update the Cyber Fraud and Abuse Act might go too far.