The state will repay about $7.1 million in federal bonuses to resolve allegations that it manipulated data related to its food stamp program.
An insecure IT supply chain can present as much risk to agencies as an insider exfiltrating data, according to security experts.
Even with security researchers looking for an Android variant of the iOS spyware, the sophisticated program designed to surveil specific targets managed to hide itself.
Safeguarding an agency against email compromise involves both administrative awareness and technical controls, such as email rules, filtering and third-party solutions.
Agencies’ different interests in threat tracking, mitigation and prosecution can make it difficult for them to share information related to cyber attacks.
IT managers can improve data security by taking a page from how the health care community prevents, tracks down and resolves public health problems.
Researchers found a way to reduce the likelihood of a successful election hack by using game theory to predict targets combined with random audits that make it harder for an attacker to change an election result without detection.
Taser International rebrands and moves to corner the body-worn camera market. But the cost considerations for local departments don't go away.
IDC’s four-stage taxonomy aims to help stakeholders understand the full scope of digital transformation efforts.
MFT provides higher levels of automation, transparency, control and security while increasing efficiency and lowering operating costs.