Writing in a recent journal, two Army captains advocate adoption of a bug bounty program to motivate the discovery of military network vulnerabilities.
Whether immediate and destructive or slow and insidious, cyber attacks are aimed at weakening U.S. capabilities on the battlefield and at the negotiation table.
While other aspects of IT security have been ratcheted up over the years, mobile security has proven a much tougher nut to crack and has lagged in the race for attention and funding.
Attacks are growing more sophisticated, and stolen digital certificates are now part of the malware package.
Privacy concerns regarding information sharing are misplaced. What investigators need to see is threat intelligence, not personally identifiable information.
A new study compares the cybersecurity posture of different levels of government.
The Department of Homeland Security has awarded $3.7 million in research funding to the University of Michigan and HRL Laboratories for automotive cybersecurity research.
Cyber Innovation Challenge seeks a way to visualize the risks associated with the networks and assets supporting a given mission.
Federal CIO Tony Scott announced the Cybersecurity Strategy and Implementation Plan, alongside updated FISMA guidance, all aimed at improving Uncle Sam's cybersecurity posture in months and years to come.
Some states make it impossible to use a child’s Social Security number and other identifying information to establish credit, and in Utah parents can have their child’s identifying information monitored by the state.
A visualization is in the works to show job postings and provide information on the supply of workers with relevant degrees or certifications.
DHS has awarded New York University $1.4 million to develop a cybersecurity system for cars.
Musings on recent news on the government cybersecurity front.
By better understanding how cyberattacks work and applying that knowledge appropriately, organizations can better prepare for inevitable hacks.