More Cybersecurity Articles
Lawmakers approved additional funding for the Cybersecurity and Infrastructure Security Agency's election security initiative and the Election Assistance Commission.
Images of travelers and license plates crossing the border were stolen when hackers breached the network of a Customs and Border Protection subcontractor.
Geospatial data can become personally identifiable information, so cities must reconcile the competing goals of access and privacy with the need to securely share data, a new report says.
It's becoming almost impossible to untangle U.S. supply chain security policy from other political and economic issues at play, particularly when dealing with China, cybersecurity experts say.
MTD makes a defender a more difficult target, reduces the need for threat detection and enables scalable security.
With new 5G networking equipment on the horizon, quantum-encrypted communications would ensure virtually unhackable transmissions, no matter what vulnerabilities exist in devices.
The General Services Administration may expand its Centers of Excellence core areas to include identity management and robotic process automation
The National Institute of Standards and Technology has revised its guidance for single sign-on for mobile public safety applications.
Thinking ahead and taking protective steps can help reduce the effects of cybersecurity incidents on both individuals and organizations.
Data-driven insights help agencies balance ensuring a program's integrity even when there are limited resources to investigate or fix identified problems.
Sign up for our newsletter.