More Cybersecurity Articles
To protect evolving technologies, agile framework developers must refine and evolve their playbooks to incorporate security best practices.
The proof of concept used the distributed-ledger technology to secure and verify log files required under the Continuous Diagnostics and Mitigation program.
Gov. Larry Hogan signed an executive order creating a chief information security officer position and establishing the Office of Security Management and the Maryland Cybersecurity Coordinating Council.
Low-cost drones not only pose a risk to public safety, but they can be instruments of foreign intelligence gathering, experts say.
MDR can provide capabilities organizations may not have in place or better utilize resources they already have -- either through augmentation or by enabling more resources.
Intent-based networking allows a network administrator to prescribe a desired network state through automation and software-defined methodologies.
A new guide aims to help privacy officers get a better understanding of privacy enhancing technology as it applies to data science research and digital government strategies.
Attacks like the 2017 Equifax hack have compromised so much personal data that knowledge-based ID verification no longer provides secure remote identification proofing.
Lawmakers approved additional funding for the Cybersecurity and Infrastructure Security Agency's election security initiative and the Election Assistance Commission.
Images of travelers and license plates crossing the border were stolen when hackers breached the network of a Customs and Border Protection subcontractor.
Sign up for our newsletter.