Since the New York Department of Motor Vehicles upgraded its technology in January, the agency has opened 900 new investigations and made 100 arrests.
In recent months steganography has gotten more sophisticated with data hidden in music and in Instagram images.
The hack that took data on 200,000 registered voters in Illinois and another that penetrated an Arizona election system are suspected to have originated in Russia.
A recently announced partnership between MobileIron and Entrust Datacard aims to deliver a derived credential solution by the end of the year.
The GCN Dig IT Awards celebrate discovery and innovation in government IT -- the cutting-edge technology and creative implementations that are supporting critical missions at all levels of the public sector.
Booz Allen Hamilton will be working with Microsoft to develop a single dockable product that workers can use like a desktop or or mobile device without losing any compute power or security.
As incidents of ransomware increase, states should eliminate easy targets and patch systems.
As agencies migrate their voice networks to internet-based platforms, session border controllers can provide additional security in unified communications.
Unlike antivirus protection, which only identifies specific signatures, advanced endpoint security provides real-time analysis of file movement and behavior across a whole network.
As the scope and sophistication of cyberattacks continue to grow, agencies are deploying ever more innovative defenses.
Gov. Terry McAuliffe is hosting a summit to discuss current cybersecurity activities, challenges and opportunities.
By monitoring the electromagnetic emissions produced by sensors on the Internet of Things, researchers hope to be able to detect when those devices have been compromised.
Although there are inherent risks to increasing the number of personal mobile devices connected to government networks, the benefits are too good to ignore.
Department of Homeland Security Secretary Jeh Johnson is conferring with state and local governments about the cybersecurity of voting systems.