More Cybersecurity Articles
Furloughed IT staff and overburdened security teams create opportunities for malicious and negligent insider attacks.
Two senators want to know the national security risks of allowing federal employees to use some foreign-made browsers and virtual private networks on government smartphones and computers.
As easy targets with high value, cities often fall victim to phishing attacks launched from common applications, such as Acrobat Reader, Microsoft Word and Chrome.
Today’s attackers use tools far more sophisticated than malware and viruses, blending techniques and relying heavily on social engineering.
The July 2018 Jack Voltaic 2.0 exercise demonstrated gaps in operational and legal authorities as well as confusion about first response.
Although a joint report says foreign agents did not have "material impact" on election infrastructure, states are asking Congress to help pay for new, more secure equipment.
Quantum Xchange sends quantum-generated cryptographic keys over fiber-optic cable to securely transfer critical data.
About a quarter of internet users use virtual private networks to keep their internet communications secure, but researchers have found that some VPN companies mislead customers about key aspects of their user protections.
Although the Defense Department has enhanced its cyber capabilities, adversaries are improving their attacks faster than defenders are shoring up their systems, a Pentagon watchdog said.
The Global Commission on Stability in Cyberspace is hashing out fundamental principles that states, non-state actors and private industry should follow in the digital domain.
Sign up for our newsletter.