A recent report outlines how local governments can manage common types of technology-related risks.
Questions on safety standards and cybersecurity still need to be answered before connected and autonomous vehicles make their way onto the nations roadways.
Customs and Border Protection will use facial recognition technology at three terminals in John F. Kennedy International Airport in New York City to verify travelers’ identities.
ACT-IAC assembled recommendations from industry, government and academia on ways agencies can reinforce their cybersecurity programs.
To address the challenges inherent in password-based security, the U.K. government is taking a different tack -- encouraging its systems administrators to simplify their approach to passwords and use automated controls.
Army researchers are working on an algorithm that will help system administrators improve security by more easily identifying malware authors and tracking the origin of threats
The Defense Department will no long accept the driver’s licenses or state-issued identification from Illinois, Minnesota, Missouri, New Mexico, Washington and American Samoa for entrance to its facilities.
The solution was designed to provide advanced security to AWS customers while giving Unisys clients ease of access and scale of the AWS cloud.
The 2016 Cyber Security Division R&D Showcase and Technical Workshop will highlight the status of the latest cybersecurity research, enable collaboration among the researchers and government agencies and connect the technologies to transition partners.
The zero-day vulnerability allows Android or Linux applications to escalate privileges and gain root access.
The National Association of State Chief Information Officers named cybersecurity the top item in its advocacy agenda.
Warning flags have been raised over SSH, which helps manage servers, routers and firewalls and is used to provide privileged access to servers and networks.
Galois has been awarded a $1.7 million contract from the Department of Homeland Security for a peer-to-peer collaboration technology that allows organizations to work together to detect and mitigate distributed denial of service attacks.
Officials from the Defense Information Systems Agency discussed the capabilities it requires for network security.