Sen. Mark Warner asks the Washington Metropolitan Area Transit Authority for an update on IT systems security and communications upgrades.
Cybersecurity is a shared responsibility, requiring effective public/private partnerships to identify and address threats, vulnerabilities and overall risk.
The devices are increasing the efficiency of Massachusetts’ probation officers monitoring low-risk offenders mandated not to drink alcohol.
Government info-security pros need not only the acumen and the skillset to understand the overarching cybersecurity threats that an agency may face, but also an understanding of the threats targeting the public sector.
State and local agencies must be able to defend against politically motivated attacks that can take websites offline, expose personal information or even knock out utility service.
DHS Secretary Jeh Johnson formally designated state election assets -- including polling places, centralized vote tabulation locations, storage facilities and related information and communications technology -- as U.S. critical infrastructure.
In a demonstration of security vulnerabilities in popular products, Federal Trade Commission researchers hacked into and took control of consumer-grade drones.
The high baseline approval will allow Amazon Web Services to handle and store data that, if compromised, could severely hurt organizational operations, assets or people.
Cloud providers haven't managed to completely persuade the government IT community that they can provide the necessary controls to ensure security and prove regulatory compliance.
As cyber threats continue to multiply, states can look to the National Guard for help.
If we are to prevent denial of service attacks on 911 systems, we must understand where the weaknesses lie, both in technology and policy.
Although federal agencies were to transition their websites to the more-secure HTTPS communications protocol by Dec. 31, some conversions remain a work in progress.
New guidance provides tactical and strategic advice for cyber event recovery planning.
As smart cities start investing in connected devices, there is arguably a much broader threat vector from botnets taking advantage of the unsecured Internet of Things.