Following the success of its Hack the Pentagon program, the Defense Department awarded two contracts to launch more challenges and find security researchers who can better detect cyber risks in DOD applications, websites and networks.
The former CIA and NSA director discusses Russia's recent hacks of Democratic party emails as well as Apple's stand against the FBI over encryption.
Public safety agencies are turning off their radio encryption over concerns of not being heard by nearby departments using older devices.
Cyber-age extortionists are preying on state and local governments, hospitals and even police departments, forcing officials to decide whether to meet the demands or risk losing their data.
Using deception tools as cybersecurity measures can not only protect critical information, but also detect intrusions.
DARPA, FEMA, NGA, Prince George's County, New Jersey's Parole Board and the Ark-Tex Council of Governments take top honors.
Researchers at the University of Washington have come up with a way to secure passwords by sending them through the human body, beyond the reach of wireless sniffers.
When it comes to the recently released movie about the famed data-pilfering National Security Agency contractor, government insiders feel that director Oliver Stone and his team should get their dramatic license revoked.
DHS has created a data framework that makes it easier to search across classified and unclassified datasets.
MITRE's ATT&CK model helps agencies understand and respond to the inevitable network penetrations.
The Fortify for Forge program gives the Defense Department’s Forge.mil users secure, rapid and cost-effective access to up-to-date software security assessment tools.
The Defense Digital Service proves that bug-bounty programs can pay big dividends for government agencies.
Organizational flexibility, encryption and automation will help network administrators better manage security as data centers shrink.
Indiana CIO Dewand Neely discusses his state's data analytics practice and its new approach to workforce cybersecurity training.