More Cybersecurity Articles
As screening programs for airline passengers and baggage have become more effective, the Transportation Security Administration looks to new ways to protect airplanes and airport systems from malicious insiders.
States and vendors must work together to foster transparency, accountability and adherence to the strictest election-security protocols.
Security researchers at MIT reported several vulnerabilities in the Voatz mobile voting app, although the company vigorously disputed the findings.
The Cybersecurity and Infrastructure Security Agency breaks down its coordination activities across four lines of effort: elections infrastructure, campaigns and political infrastructure, the American electorate and warning and response.
A deep learning tool reduces the size of performance-counter data enabling an algorithm to detect software anomalies after updates.
The public sector is expected to be the fastest-growing user of automation in the next six to 12 months, a new survey finds.
The lack of cybersecurity standards and regulations for commercial satellites, coupled with complex supply chains and layers of stakeholders, leaves satellites highly vulnerable to hackers.
To prevent security cameras from being hacked, IT managers must consider the security of the camera itself -- including its hardware and firmware -- and the security of the data it produces.
The Air Force is looking to assess the cyber threat surface posed by on-base control systems, such as building automation, life safety, utility monitoring and airfield control systems.
When it comes to predicting, identifying and preventing cyberattacks, it’s vital to factor in a hacker’s motive, according to new research on web defacements.
Sign up for our newsletter.