More Cybersecurity Articles
Automated network security can help agencies reduce downtime, enable cost-saving consolidation and make the best use of limited staff resources.
While the cybersecurity mission at the Department of Homeland Security has been steadily expanding, some think the agency may not have the resources to protect federal civilian networks.
Data-intensive criminal and counterintelligence investigations require more cyber tools, greater info-sharing capabilities and a highly skilled staff, FBI Director Christopher Wray told appropriators.
As the mobile threat landscape continues to evolve in a post-perimeter world, smoother acquisition processes and funding for the best possible security must keep pace.
Controlling unauthorized internet-of-things devices that connect to enterprise networks requires a different technical approach than BYOD management because IoT devices often lack authorization and authentication tools.
While large defense contractors typically have robust security measures in place, the smaller and medium-sized companies they subcontract with do not, making them prime targets of nation-state hackers.
Intelligence Advanced Research Projects Agency's High ClaaS (for classified as a service) program encourages development of technologies that would allow highly isolated computing tasks to be run on shared commercial clouds.
No single defense can protect every part of a democratic system and society, so elections officials must evaluate what attackers are likely to be after and what’s at stake.
The risk-scoring algorithm will help agencies prioritize mitigation activities and improve their basic cybersecurity hygiene.
For all the focus on government's inability to compete with private-sector pay, the exact dollar figure, while important, isn't disqualifying.
Sign up for our newsletter.