More Cybersecurity Articles
Federal preemption of state laws would mean states could no longer respond to privacy threats, and consumers could only turn to Congress for a remedy.
Additional resources would help the Election Assistance Commission with its expanded election security activities, EAC Chair Christy McCormick told Congress.
A new ProPublica investigation found two U.S. data recovery firms that claimed to help unlock data but actually paid the ransom and marked up their costs to the victims.
E-pollbook software made by VR Systems "catastrophically" failed on Election Day 2016 in a number of Durham County, N.C., voting precincts where voters ended up being turned away.
To better secure the defense industrial base, the Pentagon wants to publish its list of software companies it doesn't trust.
Applying negotiation tactics to ransomware attacks can help organizations manipulate the situation before, during and after an attack.
Continuous vetting, made possible by artificial intelligence and automation, provides a more deliberate and efficient process that protects data privacy, improves security and saves time and resources.
Some organizations are working to create a foundation of election-related technology that can be used and improved over time through crowdsourced testing.
ElectionGuard, an open-source software development kit, aims to make voting more secure, accessible and efficient by enabling end-to-end verification of elections.
After arming its cybersecurity staff with world-class skills, the Defense Department faces retention challenges because it gets "out-recruited," Acting Defense Secretary Patrick Shanahan says.
Sign up for our newsletter.