Individual users, small agencies and large enterprises can all contribute to raising the bar for cyber protection, making it more difficult and more expensive for cyber criminals to achieve their objectives.
The Department of Homeland Security's National Cybersecurity Assessment and Technical Services can help governments at all levels learn how their networks look to would-be attackers.
After evaluating over 30 million alerts from its users around the world, Sentinel IPS found that 67 percent of government networks and 72 percent of education networks triggered critical malware or ransomware alerts.
A shift towards software-defined security can deliver improvements in automation, virtualization and a holistic security architecture.
The company has released a patch that fixes the flaws that could give hackers access to private information.
Universities will get help commercializing the technology developed under a $12.2 million Department of Energy pilot program to protect the nation's energy infrastructure.
Just managing the device is no longer an option. Here's where the experts see mobile-security strategies heading in 2016 and beyond.
With funding from the National Strategy for Trusted Identities in Cyberspace, the pilots address barriers to the identity ecosystem and seed the marketplace with “NSTIC-aligned” solutions to enhance privacy, security and convenience in online transactions.
Although recent data breaches may indicate that computer security is harder than putting a man on the moon, the government can improve its cyber posture.
Recent surveys of government IT managers show increasing hand wringing when it comes to legacy systems.
Identifying and dealing with potential issues before they become problematic should be the primary goal of every agency’s IT team.
Could future breaches stem from such non-obvious sources as police body cameras or device components?
The Internet is a dangerous place. But there are concrete steps an organization can take to manage the risk while still allowing employees the access they need.
The Pell Center’s report on the cyber readiness of eight states explores how states are protecting infrastructure, information and operations.