More Cybersecurity Articles
New York City's NYC Secure app shows how governments can help citizens cope with cyberthreats.
Although the encryption underpinning modern internet communications could someday succumb to a quantum attack, it's important to understand that cryptography is just one piece of a much larger data-security pie.
By outsourcing security and lifecycle management of endpoint devices to reliable third parties, agencies can reap employee efficiency, safer devices and cost savings.
How can developers secure artificial intelligence applications when the underlying data is vulnerable to hackers?
An email protocol that can't authenticate senders combined with bad actors' increasingly clever tactics may mean phishing is here to stay.
Some frequently asked questions (and answers) about California's new law to secure connected devices.
As agencies migrate to the cloud, they can improve security of their endpoint devices by considering a secure Linux OS and centralized management.
About 84 percent of registered voters were put at increased risk of having their personal data exposed in the run up to the midterm elections.
Agencies must be proactive and have measures in place to protect against potentially vulnerable devices introduced into their networks.
The Intelligence Advanced Research Projects Activity wants software that can autonomously inspect a deep neural network and predict if it has a Trojan that could trigger a malfunction.
Sign up for our newsletter.