The Cybersecurity Workforce Framework’s common language describing cybersecurity work will help organizations build a strong staff to protect their systems and data.
Two Harvard cybersecurity scholars outline the election risks and recommend several steps for federal and local governments to take after the 2016 elections.
The rise of quantum computing is sure to bring new risks, but it also provides an opportunity for greater security.
An outbound virtual desktop infrastructure can significantly reduce the risks of threats to internal corporate systems and data while maintaining the benefits of internet access.
Residents of Austin, Texas, and the state of Maine are closer to having a digital identity that would allow them to conduct business with the government and other entities.
In the wake of the Mirai botnet attack, cybersecurity experts discuss issues with securing the Internet of Things.
The Cyber Investigator Certification Program can help law enforcement officers improve their handling of digital evidence.
Effective risk management and decision making is about being able to translate the conversation from what’s happening with the technology to how it impacts the mission.
Cities have taken the lead on sensor systems, but experts say the federal potential is immense -- if security improves sufficiently.
The National Institute of Standards and Technology is looking for a better way for secure laptops in patrol cars.
Even extensive training is unlikely to transform ordinary workers into hyper-vigilant phishing detectives.
The Los Angeles Integrated Security Operations Center consolidates more than 200 million log records from across 41 departments every 24 hours.
To stay ahead of adversaries, federal IT decision makers must step back from their day-to-day routines and prioritize their vulnerabilities.
Travis County, Texas, is working to combine the convenience of electronic voting and the record of paper ballots into one system.