Although cybersecurity is being woven into the fabric of government, it’s not appropriately funded, a new survey from NASCIO and Deloitte finds.
The state plans to engage technology vendors to help businesses and state agencies use blockchain technology to distribute, share, and save ledgers and contracts.
Organizations are not monitoring data movement in the most vulnerable places, a new McAfee Labs Threats Report suggests.
Because the scope of the cybersecurity challenge is expanding, it requires developing skills for solving tomorrow's issues.
Officials are urging state and local governments to leverage resources from the Department of Homeland Security to better secure election systems from cyberthreats.
Preparing for a cloud security incident will ensure that both government and cloud provider IT teams can respond quickly and effectively in a crisis.
In an election year when it seems like data security is grabbing the headlines, government IT staff can improve security for their agencies and constituents.
Experts at a cybersecurity workshop said that increased automation and built-in security are increasingly necessary, especially as the Internet of Things gains traction.
A new platform by startup Claroty examines network traffic using an inspection engine designed for critical infrastructure's IC systems.
Governance, risk management and compliance platforms can help agencies optimize operations and make the best use of limited resources.
Experts are still dialing for dollars when it comes to ideas for how to mitigate the risk, or even the impact, of a potential telephony denial-of-service attack on the 911 emergency services system.
A recent study revealed how easy it would be for bad actors to overload and disable infrastructure for the 911 emergency services in the United States.
The future of online voting will depend on the federal government’s ability to work with states to enact uniform standards for voting protocols that include a verifiable voting method voters can trust.
A new ID card reader promises to ease the process for authenticating and securing access for mobile users, making it easier to manage remote employees.