More Cybersecurity Articles
It's becoming almost impossible to untangle U.S. supply chain security policy from other political and economic issues at play, particularly when dealing with China, cybersecurity experts say.
MTD makes a defender a more difficult target, reduces the need for threat detection and enables scalable security.
With new 5G networking equipment on the horizon, quantum-encrypted communications would ensure virtually unhackable transmissions, no matter what vulnerabilities exist in devices.
The General Services Administration may expand its Centers of Excellence core areas to include identity management and robotic process automation
The National Institute of Standards and Technology has revised its guidance for single sign-on for mobile public safety applications.
Thinking ahead and taking protective steps can help reduce the effects of cybersecurity incidents on both individuals and organizations.
Data-driven insights help agencies balance ensuring a program's integrity even when there are limited resources to investigate or fix identified problems.
The cloud-based, multiplayer game analyzes decision-making behaviors from choices made in thousands of games along with basic demographic information about participants.
A pilot program showed how agencies could conduct privacy-protecting cross-agency data analysis of personal information by secure multiparty computation.
Three weeks after being hit by a ransomware attack, the city is just starting to recover. What can other government IT shops learn?
Sign up for our newsletter.