More Cybersecurity Articles
While reports of large organization suffering from cybersecurity breaches continue to emerge, we believe that comprehensive and customizable end-to-end IT security not only dramatically reduces the risks of being compromised but can also have a tremendous benefit to the institution. ThinkShield goes beyond simple endpoint security, with solutions that create huge efficiencies, streamline IT administration, improve the end-user experience.
Resilient, secure and interoperable systems are the focus of the newest update to the National Emergency Communications Plan.
Implementing zero trust through microsegmentation would prevent any unauthorized request from accessing the AWS metadata and user data.
Voting machine companies and other vendors operate with near-complete autonomy unlike other heavily regulated critical infrastructure sectors, according to a new report from the Brennan Center for Justice.
The Defense Information Systems Agency hopes to have a viable mobile authentication alternative to the common access card in the next year.
As the federal government is taking steps to lock down communications networks, agencies are considering how to help the smaller rural telecom firms pay to replace their Chinese-made equipment.
Advanced artificial intelligence and machine learning can deliver automated incident response solutions for routine incidents, freeing up scarce security analysts to conduct complex threat analysis.
The cybersecurity services will help address some of the most common digital threats -- from phishing attacks and email compromise to data theft or loss of campaign donor information, polling data and other sensitive data.
Voting Village co-founders argue the myriad vulnerabilities that exist throughout a machine's lifecycle can be easily exploited by well-resourced and creative hackers.
These 40 projects at the federal, state and local levels show just how transformative government IT can be.
The Defense Department’s High Performance Computing Modernization Program leverages HPC resources to speed response to changes in the cyber environment.
Sign up for our newsletter.