IBM Quantum Lab at the IBM T.J. Watson Research Center (IBM/YouTube)

A 10-year march toward quantum computing

A quantum computer that can crack today's state-of-the-art encryption algorithms is more than a decade off, according to the National Academies.

facial recognition (Montri Nipitvittaya/Shutterstock.com)

Facial recognition shows big improvements

Gains in the accuracy of facial recognition technology over the last four years have been "revolutionary and not evolutionary," according to an expert from the National Institute of Standards and Technology.

careless user error

How the ‘Cookie Monster cat’ exposed the accidental insider threat

In a world of real adversaries and malicious attackers, government can no longer live with employees' unforced errors.

handful of new technologies (Sergey Nivens/Shutterstock.com)

DHS previews research topics for small biz

Department of Homeland Security is calling on entrepreneurs and small businesses to help improve its emergency response, law enforcement, border protection and cyber risk management capabilities.

police officer using wireless device (First Responder Network Authority/Flickr)

Securing wireless tech for responders

As emergency communications move to wireless broadband networks, the National Institute of Standards and Technology drafts a report that analyzes the cybersecurity of mobile and wearable devices.

facial recognition technology (metamorworks/Shutterstock.com)

How facial recognition technology aids police

Unlike in border control applications -- where the environment is controlled -- when supporting street policing, facial recognition algorithms make suggestions about possible similarities to police who must then confirm or refute them.

data manipulation (Elnur/Shutterstock.com)

If your data were being manipulated, would you notice?

Leaked or stolen data is typically very public, but simple changes to a system are hard to detect even with a highly trained eye.

cloud data (CoreDESIGN/Shutterstock.com)

Securing data in the cloud requires planning, constant vigilance

The general formula for cloud security is to determine the risks, mitigate them and then keep constant vigilance to spot and stop threats.

DHS tweaking cyber 'credit score' program

The Agency-Wide Adaptive Risk Enumeration algorithm is already ingesting data, and the Department of Homeland Security plans to put it into production heading in FY2020.

connected folders (thodonal88/Shutterstock.com)

DHS looks to blockchain to deter counterfeit certificates

The Department of Homeland Security wants to prevent forgeries in the certificates and licenses issued by Customs and Border Protection, Citizen and Immigration Services and the Transportation Security Administration.

AI strategy (John Williams RUS/Shutterstock.com)

Unmasking AI-assisted cyber attacks

Researchers are developing algorithms that can detect when malware uses adversarial machine learning to attack networks and evade detection.

phishing email (Abscent/Shutterstock.com)

How agencies can protect against phishing attacks

Defending against phishing attacks involves a combination of policies, procedures and controls.

Stay Connected

Sign up for our newsletter.

I agree to this site's Privacy Policy.