Sponsored Resources

More Cybersecurity News

  • VPN (Funtap/Shutterstock.com)

    Is your VPN secure?

    About a quarter of internet users use virtual private networks to keep their internet communications secure, but researchers have found that some VPN companies mislead customers about key aspects of their user protections.

  • cyber specialists (Air Force photo by J.M. Eddins Jr.)

    DOD systems tougher to crack, but still at risk

    Although the Defense Department has enhanced its cyber capabilities, adversaries are improving their attacks faster than defenders are shoring up their systems, a Pentagon watchdog said.

  • global security (welcomia/Shutterstock.com)

    Trying to craft global cyber limits

    The Global Commission on Stability in Cyberspace is hashing out fundamental principles that states, non-state actors and private industry should follow in the digital domain.

  • email security

    Feds ahead in DMARC adoption

    Eighty percent of 1,300-plus U.S. federal domains now publish Domain-based Message Authentication, Reporting and Conformance records, a new report finds.

  • cybersecurity

    The challenge of identity and access management

    To keep up with rapid advances in technology, agencies must incorporate IAM into their overall modernization roadmap -- ensuring that today’s secure solution is still secure tomorrow.

  • abstract digital design (Dmitriy Rybin/Shutterstock.com)

    NIST narrows field of post-quantum crypto contenders

    For the second round of its competition, the National Institute of Standards and Technology has chosen 26 algorithms that may help protect electronic information from attack by quantum-enabled computers.

  • face print access (aslysun/Shutterstock.com)

    DISA tests continuous multifactor biometric ID for mobile devices

    The devices -- or more specifically, the chipsets embedded within them -- analyze a user's walking gait, location, facial structure and voice patterns to validate identity.

  • man putting on latex gloves in data center

    DOD mulls using AI to check contractor cyber hygiene

    Because the Defense Department's contractors are critical to its mission, DOD is considering having a third party check sub-contractors' security posture against the National Institute of Standards and Technology cybersecurity standards.

  • security precheck

    What cybersecurity pros can learn from TSA PreCheck

    Just as prescreened travelers get fast tracked to their airport gates, agencies should adopt a risk-adaptive security approach that uses behavioral data to inform policies for individual users.

  • cloud attack (Julia Tim/Shutterstock.com)

    Study: Most cloud attacks are opportunistic

    Attackers acted much like predators -- hunting weak targets, continually probing possible victims for vulnerability then pressing in when one was found.

Stay Connected

Sign up for our newsletter.

I agree to this site's Privacy Policy.