The Department of Homeland Security is accepting applications for its Secretary’s Honors Program Cyber Student Volunteer Initiative.
A derived credentials policy could be applied not just to devices but to specific apps that require a greater level of assurance.
Sophisticated and determined adversaries can take advantage of security weaknesses in online meeting services to obtain access to agency networks and data.
New urgency for state driver's license systems, as air travelers from non-compliant states may soon need new forms of identification to fly.
Looking forward to newer, smarter technologies is not always the most effective strategy for delivering an efficient, nimble and resilient security program. The best advice often is to properly implement the tools and technologies that have been available for years.
Security risks will increase when Microsoft stops issuing security patches for some older Internet Explorer browser versions as well as some .NET Framework 4 versions. In April of this year, SQL Server 2005 also will lose extended support.
Gov. Terry Branstad has signed an executive order pushing state agencies to develop a cybersecurity strategy.
The Idaho Department of Agriculture is first agency to deploy the eGovExpress Digital Wallet that consolidates a user’s payment information into one password-protected online account.
Despite 2015 providing an embarrassment of cybersecurity breach riches, there’s not much indication that government overall is paying that much more attention to security.
Deceased vets’ data has been sent to the wrong widows. Employees have snooped on the records of patients who’ve committed suicide. And whistleblowers say their own medical privacy has been violated. In response, the VA says patient privacy is a priority.
As the nation prepares for the next presidential election, its voting machines are in need of a serious update.
The deal with Magnetic Forensics will expand the capabilities of the company’s existing products for use by In-Q-Tel partners.
Both perimeter defense and effective elimination of threats that have breached the network are key components of a cybersecurity strategy. But what's the right mix?
The controlled chaos of an emergency creates opportunities not only for accidental data exposure, but also for exploits of sensitive data and the resources that govern industrial control systems.