Rather than trying to screen apps for malware, researchers suggest it may be more effective to monitor the behavior of installed apps for signs of improper behavior.
A blockchain-based system marries ironclad trust to a fully auditable sequence of digital events enclosed in a highly secure environment.
Google has started to maintain a list of untrusted certificate authorities, which it’s calling Submariner.
When agencies release code to open source, should they sanitize it before release or trust to the community to eventually secure it?
Despite their ubiquity and unquestioned business value, application programming interfaces are often overlooked and underprotected.
The state’s National Cybersecurity Intelligence Center aims to be the country’s foremost authority on cybersecurity education, research and rapid response.
Election officials in Ohio and Utah will see how technology improves the reporting of results and the caucus voting process.
The technology that powers Bitcoin has the potential to address government trust and security issues.
Spammers are taking advantage of misconfigured dot-gov domains and link shorteners to redirect visitors to other sites.
The National Institute of Standards and Technology is revising its 2009 telework guides to cover the booming use of employee, contractor and vendor devices to access agency resources.
With the new Assured Compliance Assessment Solution Reporting Toolkit, the Army is automating cybersecurity management.
The Endgame cybersecurity platform has helped both red and blue teams hunting and securing networks at the Air Force’s Red Flag exercise.
With today’s “assumption of compromise,” organizations need a unified, analytics-driven platform for end-to-end visibility across the enterprise.
Using only a smartphone, researchers were able to get enough information from signals created by a 3-D printer’s nozzle to reverse-engineer the object being manufactured.