More Cybersecurity Articles
As agencies migrate to the cloud, they can improve security of their endpoint devices by considering a secure Linux OS and centralized management.
About 84 percent of registered voters were put at increased risk of having their personal data exposed in the run up to the midterm elections.
Agencies must be proactive and have measures in place to protect against potentially vulnerable devices introduced into their networks.
The Intelligence Advanced Research Projects Activity wants software that can autonomously inspect a deep neural network and predict if it has a Trojan that could trigger a malfunction.
A quantum computer that can crack today's state-of-the-art encryption algorithms is more than a decade off, according to the National Academies.
Gains in the accuracy of facial recognition technology over the last four years have been "revolutionary and not evolutionary," according to an expert from the National Institute of Standards and Technology.
In a world of real adversaries and malicious attackers, government can no longer live with employees' unforced errors.
Department of Homeland Security is calling on entrepreneurs and small businesses to help improve its emergency response, law enforcement, border protection and cyber risk management capabilities.
As emergency communications move to wireless broadband networks, the National Institute of Standards and Technology drafts a report that analyzes the cybersecurity of mobile and wearable devices.
Unlike in border control applications -- where the environment is controlled -- when supporting street policing, facial recognition algorithms make suggestions about possible similarities to police who must then confirm or refute them.
Sign up for our newsletter.