The New Jersey Cybersecurity and Communications Integration Cell is working to enhance threat information sharing among health care providers.
As police departments move to electronic data transmission and storage, they are increasingly vulnerable to cyberattack.
While Congress seems to understand the urgency of implementing cybersecurity solutions, critical technology that was recognized as essential years ago still isn’t fully deployed.
A recent report outlines how local governments can manage common types of technology-related risks.
Questions on safety standards and cybersecurity still need to be answered before connected and autonomous vehicles make their way onto the nations roadways.
Customs and Border Protection will use facial recognition technology at three terminals in John F. Kennedy International Airport in New York City to verify travelers’ identities.
ACT-IAC assembled recommendations from industry, government and academia on ways agencies can reinforce their cybersecurity programs.
To address the challenges inherent in password-based security, the U.K. government is taking a different tack -- encouraging its systems administrators to simplify their approach to passwords and use automated controls.
Army researchers are working on an algorithm that will help system administrators improve security by more easily identifying malware authors and tracking the origin of threats
The Defense Department will no long accept the driver’s licenses or state-issued identification from Illinois, Minnesota, Missouri, New Mexico, Washington and American Samoa for entrance to its facilities.
The solution was designed to provide advanced security to AWS customers while giving Unisys clients ease of access and scale of the AWS cloud.
The 2016 Cyber Security Division R&D Showcase and Technical Workshop will highlight the status of the latest cybersecurity research, enable collaboration among the researchers and government agencies and connect the technologies to transition partners.
The zero-day vulnerability allows Android or Linux applications to escalate privileges and gain root access.
The National Association of State Chief Information Officers named cybersecurity the top item in its advocacy agenda.