The Pell Center’s report on the cyber readiness of eight states explores how states are protecting infrastructure, information and operations.
Pacemakers and other devices have Internet capabilities, but all too often lack adequate security.
No matter where information is located -- on the network or a personal computer -- multiple layers of security must be in place to keep threats at bay.
Interest in the DHS-run Continuous Diagnostics and Mitigation program has been slow to build outside of federal agencies, but other levels of government are beginning to take note.
Staffing alone can't solve agencies' health IT challenges, but the right workforce is absolutely critical -- and there are ways to build it more effectively.
Agencies' cyber arsenal should include full DNSSEC implementation to address DNS security weaknesses and help alleviate the threat of DNS cache poisoning.
SLAC created the Cybersecurity Improvement Plan after an audit by the Department of Energy found significant problems.
Biometrics-enabled identity programs can help governments ensure service delivery, enhance security and increase convenience for citizens.
Lt. Gen. Alan Lynn thinks closer collaboration with industry could strengthen network security with three key types of IT.
A recent analysis by Recorded Future offers yet another reason why government agencies should reduce the use of Adobe Flash Player, as it was found to be the most frequently exploited web product.
Writing in a recent journal, two Army captains advocate adoption of a bug bounty program to motivate the discovery of military network vulnerabilities.
Whether immediate and destructive or slow and insidious, cyber attacks are aimed at weakening U.S. capabilities on the battlefield and at the negotiation table.
While other aspects of IT security have been ratcheted up over the years, mobile security has proven a much tougher nut to crack and has lagged in the race for attention and funding.
Attacks are growing more sophisticated, and stolen digital certificates are now part of the malware package.