More Cybersecurity Articles
Election officials and security experts strongly disagree with a recent assessment on states' election systems infrastructure.
A new program offers tech support services that identifies monitoring apps on abuse victims' phones in a clinical setting.
Agencies should make sure their systems use properly configured security settings and integrate their monitoring tools.
The update to the Trusted Internet Connection policy aims to make it easier for agencies to take advantage of current cloud and managed services technologies while still maintaining secure connections.
Data that is being encrypted and stored today will certainly be at risk as large-scale quantum computers enter the market before that data reaches the end of its valuable life.
Cyber attacks will affect cities around the country -- especially small municipalities with talent gaps and minimal budgets -- until we can adopt a zero-trust environment with microsegmentation to validate identity and prevent hackers' lateral movement through networks.
Cybercriminals are zeroing in on the managed service providers that handle computer systems for local governments and medical clinics.
The 5G ecosystem, with its dense small-cell infrastructure, software-defined capabilities and interconnected devices, requires a redefined cyber strategy, a new report says.
Troves of digital identity documents amassed to comply with Real-ID will raise the stakes for states struggling to protect their IT systems and data.
The Army uses a mix of web-based biometrics tools to help identify people who may pose a threat to the Defense Department missions.
Sign up for our newsletter.