Using deception tools as cybersecurity measures can not only protect critical information, but also detect intrusions.
DARPA, FEMA, NGA, Prince George's County, New Jersey's Parole Board and the Ark-Tex Council of Governments take top honors.
Researchers at the University of Washington have come up with a way to secure passwords by sending them through the human body, beyond the reach of wireless sniffers.
When it comes to the recently released movie about the famed data-pilfering National Security Agency contractor, government insiders feel that director Oliver Stone and his team should get their dramatic license revoked.
DHS has created a data framework that makes it easier to search across classified and unclassified datasets.
MITRE's ATT&CK model helps agencies understand and respond to the inevitable network penetrations.
The Fortify for Forge program gives the Defense Department’s Forge.mil users secure, rapid and cost-effective access to up-to-date software security assessment tools.
The Defense Digital Service proves that bug-bounty programs can pay big dividends for government agencies.
Organizational flexibility, encryption and automation will help network administrators better manage security as data centers shrink.
Indiana CIO Dewand Neely discusses his state's data analytics practice and its new approach to workforce cybersecurity training.
An aggressive push for improved authentication has resulted in savings, standardization and safer data.
The National Institute of Standards and Technology has come out with a self-assessment tool that should give organizations a better understanding of how they are progressing with security risk management efforts.
Los Angeles’ Integrated Security Operations Center consolidates all departmental cybersecurity into one central system.
In response to the threat of foreign interference in U.S. elections, 18 states have asked the Department of Homeland Security for advice on how to protect voting technology from cyber tampering.