For most agencies, a combination of security products create a formidable defense.
Because it’s not possible to scale up the cybersecurity talent pool fast enough to address escalating threats, artificial intelligence approaches to cybersecurity automation provide a highly desirable solution.
To make the cloud more secure, IT teams must adopt a proactive, real-time approach to protecting it, taking advantage of agile software development and better monitoring capabilities.
Developed by University of Florida researchers, CryptoDrop can halt a process that appears to be tampering with a large amount of the user’s data.
Criminals are getting better at what they do and upping the ante by attacking larger agencies and demanding more money.
Government agencies, particularly state and local ones, are under attack by hackers who are using a combination of malware, phishing and social engineering to wring money from their public-sector victims.
The Department of Health and Human Services announces funding opportunities for an information sharing and analysis organization to improve cybersecurity in the health care sector.
The National Institute of Standards and Technology’s reference design would improve interoperability between mobile platforms, applications and identity systems for public safety organizations.
The Immigration and Customs Enforcement forensics lab has beefed up its equipment and travel document library to better fight foreign terrorism.
This year’s Cyber Grand Challenge will be the first all-computer hacking tournament where machines will try to find and fix bugs in real time.
Market forces and the fear of liability may ultimately make the voluntary guidelines the de facto standard for public- and private-sector cybersecurity.
Software developed by Duke University researchers lets users of camera-equipped devices specify what others can see, preventing inadvertent disclosure of restricted information.
A much-improved version of the cryptographic building block lacks FIPS 140-2 validation, but SafeLogic is stepping in to change that.
Protecting the infrastructure from attack will require a new way of thinking about critical systems cybersecurity.