A new ID card reader promises to ease the process for authenticating and securing access for mobile users, making it easier to manage remote employees.
Fusion centers and local law enforcement communities still face challenges accessing decentralized databases and classified data.
The new report on the breaches at the Office of Personnel Management presents a template for how to design security to prevent future intrusions.
Attendees at a privacy workshop agreed that the National Institute of Standards and Technology's privacy guidance needs improvement.
At a ransomware workshop hosted by the Federal Trade Commission, panelists advised increased cyber hygiene, patching and backups.
Although USB “drop attacks” have served as a well-known hacker exploit, a recent study shows that the scheme remains effective even among security-aware populations.
Because state and local governments collect and store vast amounts of personal data, they are prime targets for cyberattacks.
Defense of cyber-physical systems requires multidisciplinary collaboration to address their inherent vulnerabilities.
Agencies must manage and monitor their privileged accounts and users with access to sensitive data.
According to a new report, a hack targeting only a few systems in a swing state could be enough to alter the outcome of a national race.
Since the New York Department of Motor Vehicles upgraded its technology in January, the agency has opened 900 new investigations and made 100 arrests.
In recent months steganography has gotten more sophisticated with data hidden in music and in Instagram images.
The hack that took data on 200,000 registered voters in Illinois and another that penetrated an Arizona election system are suspected to have originated in Russia.
A recently announced partnership between MobileIron and Entrust Datacard aims to deliver a derived credential solution by the end of the year.