The National Institute of Standards and Technology is looking for a better way for secure laptops in patrol cars.
Even extensive training is unlikely to transform ordinary workers into hyper-vigilant phishing detectives.
The Los Angeles Integrated Security Operations Center consolidates more than 200 million log records from across 41 departments every 24 hours.
To stay ahead of adversaries, federal IT decision makers must step back from their day-to-day routines and prioritize their vulnerabilities.
Travis County, Texas, is working to combine the convenience of electronic voting and the record of paper ballots into one system.
The Intelligence Advanced Research Projects Activity is looking for a virtual user environment that can support the kind of security analytics required to protect sensitive government users or workloads.
A new report outlines a range of vulnerabilities, infiltration points and tactics that could be used to undermine credibility in an election or even manipulate the results.
With more government services facing potential cyberthreats, the Department of Homeland Security is working to lower the risk and impact of potential telephone system-based attacks on 911 call centers.
Following the success of its Hack the Pentagon program, the Defense Department awarded two contracts to launch more challenges and find security researchers who can better detect cyber risks in DOD applications, websites and networks.
Updates to A-130 make continuous privacy and vulnerability monitoring responsibilities of every agency.
New technologies and cyber-savvy leadership are taking the intuition and guesswork out of security.
The Barnstable Police Department thwarts ransomware attacks with technology that more frequently and inexpensively copies and stores its data.
Gov. Terry McAuliffe said he wants other states to follow Virginia’s lead in cybersecurity.
The former CIA and NSA director discusses Russia's recent hacks of Democratic party emails as well as Apple's stand against the FBI over encryption.