More Cybersecurity Articles
About a quarter of internet users use virtual private networks to keep their internet communications secure, but researchers have found that some VPN companies mislead customers about key aspects of their user protections.
Although the Defense Department has enhanced its cyber capabilities, adversaries are improving their attacks faster than defenders are shoring up their systems, a Pentagon watchdog said.
The Global Commission on Stability in Cyberspace is hashing out fundamental principles that states, non-state actors and private industry should follow in the digital domain.
Eighty percent of 1,300-plus U.S. federal domains now publish Domain-based Message Authentication, Reporting and Conformance records, a new report finds.
To keep up with rapid advances in technology, agencies must incorporate IAM into their overall modernization roadmap -- ensuring that today’s secure solution is still secure tomorrow.
For the second round of its competition, the National Institute of Standards and Technology has chosen 26 algorithms that may help protect electronic information from attack by quantum-enabled computers.
The devices -- or more specifically, the chipsets embedded within them -- analyze a user's walking gait, location, facial structure and voice patterns to validate identity.
Because the Defense Department's contractors are critical to its mission, DOD is considering having a third party check sub-contractors' security posture against the National Institute of Standards and Technology cybersecurity standards.
Just as prescreened travelers get fast tracked to their airport gates, agencies should adopt a risk-adaptive security approach that uses behavioral data to inform policies for individual users.
Attackers acted much like predators -- hunting weak targets, continually probing possible victims for vulnerability then pressing in when one was found.
Sign up for our newsletter.