At a ransomware workshop hosted by the Federal Trade Commission, panelists advised increased cyber hygiene, patching and backups.
Although USB “drop attacks” have served as a well-known hacker exploit, a recent study shows that the scheme remains effective even among security-aware populations.
Because state and local governments collect and store vast amounts of personal data, they are prime targets for cyberattacks.
Defense of cyber-physical systems requires multidisciplinary collaboration to address their inherent vulnerabilities.
Agencies must manage and monitor their privileged accounts and users with access to sensitive data.
According to a new report, a hack targeting only a few systems in a swing state could be enough to alter the outcome of a national race.
Since the New York Department of Motor Vehicles upgraded its technology in January, the agency has opened 900 new investigations and made 100 arrests.
In recent months steganography has gotten more sophisticated with data hidden in music and in Instagram images.
The hack that took data on 200,000 registered voters in Illinois and another that penetrated an Arizona election system are suspected to have originated in Russia.
A recently announced partnership between MobileIron and Entrust Datacard aims to deliver a derived credential solution by the end of the year.
The GCN Dig IT Awards celebrate discovery and innovation in government IT -- the cutting-edge technology and creative implementations that are supporting critical missions at all levels of the public sector.
Booz Allen Hamilton will be working with Microsoft to develop a single dockable product that workers can use like a desktop or or mobile device without losing any compute power or security.
As incidents of ransomware increase, states should eliminate easy targets and patch systems.
As agencies migrate their voice networks to internet-based platforms, session border controllers can provide additional security in unified communications.