The Department of Health and Human Services is looking for ideas on how blockchain can be used to address privacy, security and scalability challenges of managing electronic health records and resources.
Combining the basics of good IT hygiene with the powerful and unprecedented protection of today’s operating systems and processors ensures that agencies will meet the security demands of the modern, mobile workforce.
Chief information security officers listen to hundreds of company pitches for security tools and solutions every year, a new report finds.
There's one more week to make your nominations for the GCN dig IT Awards -- so please help us showcase the best examples of discovery and innovation in government IT.
Identity analytics offer a more efficient way to prevent and investigate fraud.
West Point has partnered with a small Silicon Valley startup to give cadets a chance to learn from network security professionals.
Even computer systems equipped with recommended cybersecurity technology can't detect all threats, which explains why a cybersecurity startup found malware on San Antonio's mass transit computer systems.
The nomination deadline has been extended to July 21 -- here's how to make yours count!
Now that hackers use apps as a front end for their attacks, ‘benign’ no longer means what you think it does.
As part of the Vigilant Guard exercise, the Vermont National Guard will provide a cyber exercise range that will simulate an intrusion within a power distribution network.
This year, states have enacted dozens of laws intended to give people greater control over who has access to their private activity and information, including where and how it is collected, stored, shared and used.
While malware often gets hackers into a network, once inside, they use standard networking and admin tools for reconnaissance, lateral movement and exfiltration, a new report says.
The Windows 10 update frequency will require agencies to re-evaluate oversight and controls to prevent risk.
In the public sector, legacy infrastructure complicates any security decision.