The Idaho Department of Agriculture is first agency to deploy the eGovExpress Digital Wallet that consolidates a user’s payment information into one password-protected online account.
Despite 2015 providing an embarrassment of cybersecurity breach riches, there’s not much indication that government overall is paying that much more attention to security.
Deceased vets’ data has been sent to the wrong widows. Employees have snooped on the records of patients who’ve committed suicide. And whistleblowers say their own medical privacy has been violated. In response, the VA says patient privacy is a priority.
As the nation prepares for the next presidential election, its voting machines are in need of a serious update.
The deal with Magnetic Forensics will expand the capabilities of the company’s existing products for use by In-Q-Tel partners.
Both perimeter defense and effective elimination of threats that have breached the network are key components of a cybersecurity strategy. But what's the right mix?
The controlled chaos of an emergency creates opportunities not only for accidental data exposure, but also for exploits of sensitive data and the resources that govern industrial control systems.
The Department of Homeland Security’s new innovation framework aims to engage non-traditional government contractors, including start-up companies, for solutions to homeland security threats.
The National Institute of Standards and Technology wants input regarding the implementation and potential improvements of its voluntary Framework for Improving Critical Infrastructure Cybersecurity.
Enterprises can better protect themselves from cyberattacks if they combine automated network threat detection tools with traditional perimeter security methods, according to a new report from the SANS Institute.
A joint New York-New Jersey team was one of 13 new cyber units the Guard announced it would activate throughout 23 states by the end of fiscal year 2019.
A new report identifies the biggest cloud cybersecurity concerns across eight industries.
Effective security solutions need to strike a balance between data sharing and privacy protection.
In a response to a We the People petition on encryption, the White House said it would meet with petitioners and asked for additional public comments.