Spammers are taking advantage of misconfigured dot-gov domains and link shorteners to redirect visitors to other sites.
The National Institute of Standards and Technology is revising its 2009 telework guides to cover the booming use of employee, contractor and vendor devices to access agency resources.
With the new Assured Compliance Assessment Solution Reporting Toolkit, the Army is automating cybersecurity management.
The Endgame cybersecurity platform has helped both red and blue teams hunting and securing networks at the Air Force’s Red Flag exercise.
With today’s “assumption of compromise,” organizations need a unified, analytics-driven platform for end-to-end visibility across the enterprise.
Using only a smartphone, researchers were able to get enough information from signals created by a 3-D printer’s nozzle to reverse-engineer the object being manufactured.
The National Security Agency is taking nominations for its Best Scientific Cybersecurity Paper Competition.
New research demonstrating that quantum computing is now just an engineering challenge moves the possibility of encryption-cracking machines to the front burner.
Simple and inexpensive telephony denial-of-service attacks are increasingly targeting government phone systems.
While the Department of Health and Human Services has made progress in compliance with the Federal Information Security Modernization Act, it still has room to improve its security program.
DOD Cybersecurity Discipline Implementation Plan covers identity authentication, reducing networks' attack surface, device hardening and the alignment of computer network defenders with DOD IT systems and networks.
With proactive, appropriate security controls, IT managers can secure their networks, save administrative time and deliver a flexible, personalized environment for users.
While it is virtually impossible to know when cybercriminals will attack, taking certain preventative actions before an attack can certainly reduce the risk of damage.
A researcher presenting at the RSA Security Conference said he can hack and hijack a popular drone model via two separate system vulnerabilities.