U.S. CIO Tony Scott said securing shared networks and applications will help maintain network resiliency.
States are working to try to stop online filing fraud by verifying the identity of the filers, strengthening password protocols and sharing information on filings that use stolen identities.
Software-defined systems could prove the best way to tackle the security problems that otherwise threaten to overwhelm government.
The Cybersecurity National Action Plan has potential -- but now we must encourage mass-scale commitment.
The General Services Administration is weaving cybersecurity into the fabric of its next-generation telecommunications contract.
A new bill would preempt states from making their own laws regarding access to encrypted communications.
CRU’s SCILock Secure Drive protects operating systems and other software from unauthorized changes, preventing malware from taking hold and becoming persistent.
The New Jersey Cybersecurity and Communications Integration Cell is working to enhance threat information sharing among health care providers.
As police departments move to electronic data transmission and storage, they are increasingly vulnerable to cyberattack.
While Congress seems to understand the urgency of implementing cybersecurity solutions, critical technology that was recognized as essential years ago still isn’t fully deployed.
A recent report outlines how local governments can manage common types of technology-related risks.
Questions on safety standards and cybersecurity still need to be answered before connected and autonomous vehicles make their way onto the nations roadways.
Customs and Border Protection will use facial recognition technology at three terminals in John F. Kennedy International Airport in New York City to verify travelers’ identities.
ACT-IAC assembled recommendations from industry, government and academia on ways agencies can reinforce their cybersecurity programs.