States increasingly are employing facial recognition software to compare driver’s license or ID photos with other images on file.
Vencore Labs’ SecureSMART solution helps utilities detect early signs of attacks on wireless networks and validate security controls in the electric grid.
The Office of Personnel Management warned that anyone who has submitted to a background check since 2000 is likely at risk — as are some of the family and associates listed on their applications.
The key to enhancing mobile security is combining a secure digital identity with a second authentication factor such as a PIN or fingerprint to let employees use their devices to authenticate themselves for physical and digital access.
Louisiana Tech and the University of San Diego have launched programs to support public-private cybersecurity research and build a cyber-savvy workforce.
The U.S. Computer Emergency Readiness Team collaborates with other federal agencies and industry to quickly disseminate cyber threat alerts.
NIST has proposed two new building blocks to improve email security and to provide security services based on personal identity verification (PIV) credentials through mobile devices.
Following recent cyber breaches, U.S. CIO Tony Scott ordered a cybersecurity sprint to rapidly evaluate problem areas. As that 30-day dash comes to a close, experts weigh in on the likely outcomes.
The Department of Homeland Security expands its FedVTE program, giving state, local, tribal and territorial government employees free access to cybersecurity training.
Most of the exposures came from agency contractor or business partner sites or from employees using their government email accounts to register for web-based services, according to security threat analyst Recorded Future.
US-CERT warns feds to look carefully before clicking on those emails about identity-protection services.
No one denies that John Hancock signed the Declaration of Independence. An e-signature should provide same irrefutable verification for centuries to come.
Because supervisory control and data acquisition systems manage critical infrastructure, acceptance of risks in cloud-based SCADA system controls should approach zero.
The Army is continuing with updates to its cryptographic devices as part of the Army-Wide Cryptographic Network Standardization.