The Intelligence Advanced Research Projects Activity is looking for a virtual user environment that can support the kind of security analytics required to protect sensitive government users or workloads.
A new report outlines a range of vulnerabilities, infiltration points and tactics that could be used to undermine credibility in an election or even manipulate the results.
With more government services facing potential cyberthreats, the Department of Homeland Security is working to lower the risk and impact of potential telephone system-based attacks on 911 call centers.
Following the success of its Hack the Pentagon program, the Defense Department awarded two contracts to launch more challenges and find security researchers who can better detect cyber risks in DOD applications, websites and networks.
Updates to A-130 make continuous privacy and vulnerability monitoring responsibilities of every agency.
New technologies and cyber-savvy leadership are taking the intuition and guesswork out of security.
The Barnstable Police Department thwarts ransomware attacks with technology that more frequently and inexpensively copies and stores its data.
Gov. Terry McAuliffe said he wants other states to follow Virginia’s lead in cybersecurity.
The former CIA and NSA director discusses Russia's recent hacks of Democratic party emails as well as Apple's stand against the FBI over encryption.
Public safety agencies are turning off their radio encryption over concerns of not being heard by nearby departments using older devices.
Cyber-age extortionists are preying on state and local governments, hospitals and even police departments, forcing officials to decide whether to meet the demands or risk losing their data.
Using deception tools as cybersecurity measures can not only protect critical information, but also detect intrusions.
DARPA, FEMA, NGA, Prince George's County, New Jersey's Parole Board and the Ark-Tex Council of Governments take top honors.
Researchers at the University of Washington have come up with a way to secure passwords by sending them through the human body, beyond the reach of wireless sniffers.