More Cybersecurity Articles
Predictive analytics can give agencies and their contractors a better understanding of supplier risks over time so they can make more informed decisions.
Cyber Command's campaign against the Russian Internet Research Agency indicates a priority shift from reacting to electronic intrusions into military networks to engaging in active operations that seek to stop enemies from achieving their objectives.
The consequences of a government-managed social media account falling into the wrong hands can have far-reaching impacts both for government and citizens.
The Cyber-Hunting at Scale program seeks to develop automated tools that can detect and protect multiple Defense Department enterprise networks from nefarious actors and novel attack vectors.
Knowing what’s on the network, how it’s being used and by whom is essential before security protocols for a hybrid cloud environment can be correctly set up.
With a new collection of open-source tools and code wrappers, network forensic investigators can capture, selectively analyze and reconstruct files from network traffic. The all-in-one toolkit is free for law enforcement teams in the U.S.
The Cybersecurity Coalition calls for a coordinated frameworks covering security researchers who probe websites, software and code for flaws and vulnerabilities.
Advances in artificial intelligence are rendering current methods of protecting biometric data obsolete.
The Cyber Reskilling Academy is envisioned as a vehicle for filling the talent gap by transitioning members of the existing federal workforce to high-level cybersecurity work.
Election officials broadly support paper ballots and post-election audits, but two-thirds said they don't have the money to replace their machines in a timely fashion, according to a new report by the Brennan Center for Justice.
Sign up for our newsletter.