More Cybersecurity Articles
Voting system vulnerabilities have been the focus of election security discussions, but critical infrastructure attacks that prevent voters from getting to the polls could prove more effective.
As the concept of zero trust gains traction, the Cybersecurity and Infrastructure Security Agency is working to make the strategy mesh with the third version of the Trusted Internet Connection policy.
As screening programs for airline passengers and baggage have become more effective, the Transportation Security Administration looks to new ways to protect airplanes and airport systems from malicious insiders.
States and vendors must work together to foster transparency, accountability and adherence to the strictest election-security protocols.
Security researchers at MIT reported several vulnerabilities in the Voatz mobile voting app, although the company vigorously disputed the findings.
The Cybersecurity and Infrastructure Security Agency breaks down its coordination activities across four lines of effort: elections infrastructure, campaigns and political infrastructure, the American electorate and warning and response.
A deep learning tool reduces the size of performance-counter data enabling an algorithm to detect software anomalies after updates.
The public sector is expected to be the fastest-growing user of automation in the next six to 12 months, a new survey finds.
The lack of cybersecurity standards and regulations for commercial satellites, coupled with complex supply chains and layers of stakeholders, leaves satellites highly vulnerable to hackers.
To prevent security cameras from being hacked, IT managers must consider the security of the camera itself -- including its hardware and firmware -- and the security of the data it produces.
Sign up for our newsletter.