More Cybersecurity Articles
After suffering one of the most high-profile election attacks in 2016, state and local officials met with federal lawmakers to discuss plans for 2020.
The synergy between policy goals, business needs and digital transformation is crucial to governments' ability to optimize the services they offer.
Building automation systems relying on internet-of-things technologies open entry points for malicious actors to attack other mission-critical networks.
Similar to how airport security depends on concourse design constraints, access control mechanisms and constant monitoring, agencies can minimize API attack surfaces through restrictive design and machine-learning based monitoring.
Over a two-week period, white-hat hackers scoured hundreds of public-facing DOD Information Network proxy servers, virtual private networks and virtual desktops to find and disclose vulnerabilities.
The Defense Information Systems Agency is looking for vendors to establish a federated identity service that will allow it to centrally manage identity, credential and access management across DOD.
Security teams must obtain visibility into every app and establish a zero-trust access model for each endpoint in a way that doesn’t compromise user privacy.
Rudimentary, easily exploitable software vulnerabilities are the most common ways bad actors get into systems and networks, a national security expert says.
Information security research and hacking are creating positive developments for the public and private sectors.
Threat identification, continuous monitoring and security training will help the Defense Department mitigate its cybersecurity vulnerabilities.
Sign up for our newsletter.