More Cybersecurity Articles
Eighty percent of 1,300-plus U.S. federal domains now publish Domain-based Message Authentication, Reporting and Conformance records, a new report finds.
To keep up with rapid advances in technology, agencies must incorporate IAM into their overall modernization roadmap -- ensuring that today’s secure solution is still secure tomorrow.
For the second round of its competition, the National Institute of Standards and Technology has chosen 26 algorithms that may help protect electronic information from attack by quantum-enabled computers.
The devices -- or more specifically, the chipsets embedded within them -- analyze a user's walking gait, location, facial structure and voice patterns to validate identity.
Because the Defense Department's contractors are critical to its mission, DOD is considering having a third party check sub-contractors' security posture against the National Institute of Standards and Technology cybersecurity standards.
Just as prescreened travelers get fast tracked to their airport gates, agencies should adopt a risk-adaptive security approach that uses behavioral data to inform policies for individual users.
Attackers acted much like predators -- hunting weak targets, continually probing possible victims for vulnerability then pressing in when one was found.
The Guaranteeing AI Robustness against Deception program aims to create machine-learning models that can defend against a wide range of attacks.
Defense Information Systems Agency is building an artificial intelligence-based service to check and verify security clearance applications against multiple data sources.
The 2019 National Intelligence Strategy highlights the security pressures from advanced technologies and calls for increased cyber threat intelligence.
Sign up for our newsletter.