Paulding County, Ga., gets good broadband connectivity over cellular service for its mobile command center, but it is considering satellite communications as a backup service.
Digital signatures used in the spear-phishing campaign against the natural gas industry are identical to those used in the RSA breach, according to a published report.
CIOs describe what works with mobile application development at NASCIO's Mid-year Conference.
The department has a program to help develop technology for first responders, but matching the money with state and local agencies' requirements has proved difficult.
DHS alerts operators that "tightly focused" attacks, ongoing since at least December, have compromised a number of organizations.
People are moving quickly to mobile devices and relying on text and video rather than voice. Can Next-Gen 911 catch up?
The Federal Communications Commission's road map for the transition to a new generation of 911 services starts with location accuracy.
The FBI has drafted a proposal that would require social networking, webmail and IM sites, as well as voice-over-IP providers, to make their sites wiretap-ready, and it is asking those companies not to oppose the measure.
The National Preparedness Report from FEMA puts cybersecurity at the bottom of the readiness list, with fewer than half of states prepared to defend IT systems and networks.
Current international collaboration against online criminals could offer a template for broader cooperation on cybersecurity, although law enforcement has challenges of its own.
An artist finds that the same approach used in World War I to confound the rangefinders on attacking ships will prevent a facial scanner from recognizing you.
Infections by the persistent worm, which takes advantage of weak or shared passwords or stolen login tokens, rose in 2011, Microsoft says.
Respondents in a new survey expect to be hit by cyberattacks and have failed to adequately secure their systems, but they also do not want government regulation.
Without government mandates to secure critical infrastructure, a damaging cyberattack on the nation will happen, experts tell a House panel.
A server seized in connection with a series of bomb threats directed at the University of Pittsburgh won't help authorities find the person responsible.