NEC's newest biometric fingerprinting device promises faster and more accurate data collection in the field.
Building data secure by default is now technically possible, but a standard must be developed before we’re faced with a stream of fragmented, unsecured data.
White-hat hackers have a chance to try their skills against the Defense Department with the opening of the "Hack the Pentagon" pilot, designed to identify and resolve security vulnerabilities in DOD websites.
Although enterprise security will never be perfect, the NSA lifecycle can give defenders a model for mapping the appropriate mitigation to each step in the intrusion process.
The vulnerability lets attackers use hijacked devices enrolled in mobile device management programs to launch man-in-the-middle attacks, according to Check Point Software.
Automated Indicator Sharing allows industry and government to exchange cybersecurity threat information.
Cybersecurity students from eight universities will compete to defend a mock financial institution from attack.
Rather than trying to screen apps for malware, researchers suggest it may be more effective to monitor the behavior of installed apps for signs of improper behavior.
A blockchain-based system marries ironclad trust to a fully auditable sequence of digital events enclosed in a highly secure environment.
Google has started to maintain a list of untrusted certificate authorities, which it’s calling Submariner.
When agencies release code to open source, should they sanitize it before release or trust to the community to eventually secure it?
Despite their ubiquity and unquestioned business value, application programming interfaces are often overlooked and underprotected.
The state’s National Cybersecurity Intelligence Center aims to be the country’s foremost authority on cybersecurity education, research and rapid response.
Election officials in Ohio and Utah will see how technology improves the reporting of results and the caucus voting process.