More Cybersecurity Articles
The Defense research agency is exploring the feasibility of locking down election systems with open-source software and secure hardware.
The Continuous Diagnostics and Mitigation program can drive an integrated strategy that helps solve the complexity issues that challenge cyber defense.
While there's a fundamental need for overall system modernization, state motor vehicle departments can make specific, near-term upgrades that will improve a portion of the DMV experience for both citizens and staff.
To take advantage of the cloud, accommodate remote employees and boost security, government must reconcile previous cloud security models with today's reality, a top cyber official said.
In a letter to the sergeant at arms, two senators call for statistics on the number of Senate computers have been compromised and the times hackers have successfully accessed sensitive Senate data.
The administration's cyber priorities include increasing the qualified pool of cyber workers in government and boosting funds for cyber risk assessments, investigations and law enforcement.
Predictive analytics can give agencies and their contractors a better understanding of supplier risks over time so they can make more informed decisions.
Cyber Command's campaign against the Russian Internet Research Agency indicates a priority shift from reacting to electronic intrusions into military networks to engaging in active operations that seek to stop enemies from achieving their objectives.
The consequences of a government-managed social media account falling into the wrong hands can have far-reaching impacts both for government and citizens.
The Cyber-Hunting at Scale program seeks to develop automated tools that can detect and protect multiple Defense Department enterprise networks from nefarious actors and novel attack vectors.
Sign up for our newsletter.