Starting this summer, the National Institute of Standards and Technology will begin to automate delivery of revisions to Special Publication 800-53.
The Department of Homeland Security has tapped a startup to ensure that contact tracing apps protect users’ security, privacy and civil liberties.
Mathematically enforced privacy solutions feature built-in privacy preservation that allows agencies to leverage their data more effectively.
The North Korean operation highlights three important trends: stealing cyberweapons from industry, social media as a weapon and the blurring of cyber and information warfare.
IT asset management is much more than a technology or a software solution; it is a strategy that aligns an agency’s internal asset management processes with the Continuous Diagnostics and Mitigation program’s security objectives.
A cybersecurity system called in-toto, which the government paid to develop but never required, might have protected against the SolarWinds hack.
If the Einstein intrusion detection system was unlikely to have detected the malware that was delivered via the SolarWinds Orion update, how can it be fixed?
The Transportation Security Administration is working with Delta Airlines and the Detroit Metropolitan Wayne County Airport to test a touchless system that verifies a domestic passenger’s digital identity with customer’s passport number, TSA PreCheck membership and a live photo.
The state auditor’s software procurement principles are designed to help agencies review applications for privacy violations and potential algorithmic bias.
Until the U.S. gets serious about supply chain management generally, and cybersecurity specifically, the nation will be unable to shift its thinking from “just in time” to “just in case.”