More Cybersecurity Articles
While reports of large organization suffering from cybersecurity breaches continue to emerge, we believe that comprehensive and customizable end-to-end IT security not only dramatically reduces the risks of being compromised but can also have a tremendous benefit to the institution. ThinkShield goes beyond simple endpoint security, with solutions that create huge efficiencies, streamline IT administration, improve the end-user experience.
As the concept of zero trust gains traction, the Cybersecurity and Infrastructure Security Agency is working to make the strategy mesh with the third version of the Trusted Internet Connection policy.
As screening programs for airline passengers and baggage have become more effective, the Transportation Security Administration looks to new ways to protect airplanes and airport systems from malicious insiders.
States and vendors must work together to foster transparency, accountability and adherence to the strictest election-security protocols.
Security researchers at MIT reported several vulnerabilities in the Voatz mobile voting app, although the company vigorously disputed the findings.
The Cybersecurity and Infrastructure Security Agency breaks down its coordination activities across four lines of effort: elections infrastructure, campaigns and political infrastructure, the American electorate and warning and response.
A deep learning tool reduces the size of performance-counter data enabling an algorithm to detect software anomalies after updates.
The public sector is expected to be the fastest-growing user of automation in the next six to 12 months, a new survey finds.
The lack of cybersecurity standards and regulations for commercial satellites, coupled with complex supply chains and layers of stakeholders, leaves satellites highly vulnerable to hackers.
To prevent security cameras from being hacked, IT managers must consider the security of the camera itself -- including its hardware and firmware -- and the security of the data it produces.
The Air Force is looking to assess the cyber threat surface posed by on-base control systems, such as building automation, life safety, utility monitoring and airfield control systems.
Sign up for our newsletter.