Using intelligent deception, IT security teams can not only deflect attacks, but they can also detect what invaders are looking for and ultimately identify the cyber criminals and stop the attack.
Working with Carnegie Mellon University, the Army Reserve has developed the Cyber Warrior Database, a master repository to track the skills soldiers acquire in their civilian jobs and match them to potential military applications.
Cyber professionals must help decision makers understand the nature, impact and context of vulnerabilities so they understand the available courses of action, their relative costs, impacts and benefits.
The intelligence community's research arm is working on detecting fake fingerprints and developing devices to collect fingerprint data without a human operator.
At the National Governors Association winter meeting, Govs. Terry McAuliffe and Brian Sandoval both spoke about opportunities for the federal and state governments to work together and across the aisle.
The independent federal commission that helps states improve their voting systems wants more clarity on what DHS' critical infrastructure designation means.
Officials in Livingston County, Mich., turned to a machine learning tool that can find anomalies in user and device behaviors without previous knowledge of what to look for.
Beyond ensuring overall network security, government cybersecurity specialists have several ways of locking down a smartphone.
The city modified the open source code from Boston’s Adopt a Hydrant program, which lets residents volunteer to shovel out fire hydrants buried by snowstorms.
Temporal Defense Systems plans to use the D-Wave 2000Q to solve complex cybersecurity problems affecting governments and commercial enterprises.