More Cybersecurity Articles
Rather than assess technology systems and manpower alternatives to securing the border, Customs and Border Protection pushed construction of physical barriers, according to a new report from the Department of Homeland Security’s Office of Inspector General.
Cybersecurity defense strategies based upon dumb machines are actually a very smart plan.
Gaining detailed visibility into which users hackers are targeting and what tools they’re using is the first step on the road to security.
Cybercriminals can launch massive phishing attacks targeting users of campus networks and gain access to highly desirable and sensitive information related to research, patents and other types of intellectual property data.
The Defense Advanced Research Projects Agency is looking for ways to automate the identification of tools and processes used in deepfakes, or adversarial machine learning attacks, so an adversary’s unique weaknesses can be targeted and responses developed at scale.
Government’s widespread adoption of teleworking and wireless technologies has raised the threat of radio frequency attacks to an all-time high.
A security researcher who bought a used body camera on eBay was able to extract audio and video of Fort Huachuca military police officers at work.
Contact tracing data can help public health agencies track, identify and quarantine new cases of COVID-19, but if that data falls into the wrong hands, the consequences could be devastating.
A particularly dangerous vulnerability has been uncovered in F5’s BIG-IP networking devices produced by F5, impacting enterprise networks across the globe.
A secure access service edge allows easy onboarding of disparate and misaligned systems, zero-trust access and integration with the cloud resources on which governments increasingly rely.
Sign up for our newsletter.