The administration is looking for comments on strategic guidance containing baseline expectations for agency migrations to a zero-trust architecture.
A backup system that is a virtual device not only manages the storing of the agency’s data on physical media but it also creates a virtualized copy of that data for production.
A proof-of-concept in Riverside County, Calif., allows customers to select the records they need, authenticate themselves, pay for the copies and receive blockchain-secured digital documents within minutes.
Researchers have developed an architecture that allows internet-of-things devices on a local network to access a centralized hub with up to date third-party libraries.
Numerous high-profile cybersecurity breaches over the past year have changed the way we think about infrastructure, prompting a reevaluation of what must be done to protect the assets that ensure national security and the resources that safeguard our competitiveness as a nation.
The tech company is working with states to create digital IDs from driver’s licenses for the Apple’s Wallet app.
Until facial recognition technologies are better understood, their use in consequential applications should be halted until they can be properly regulated.
Zero-trust architecture will help agencies detect and prevent potential breaches, not just react to ones that already happened.
The continuous data flow from automated testing gives agencies the insights they need to effectively modify inadequate security tools and programs and better prepare for future cyberattacks.
Many of this year’s winners were chosen for their work securing the federal government’s IT systems against bad actors looking to take advantage of the chaos caused by the pandemic and election misinformation.