The zero-day vulnerability allows Android or Linux applications to escalate privileges and gain root access.
The National Association of State Chief Information Officers named cybersecurity the top item in its advocacy agenda.
Warning flags have been raised over SSH, which helps manage servers, routers and firewalls and is used to provide privileged access to servers and networks.
Galois has been awarded a $1.7 million contract from the Department of Homeland Security for a peer-to-peer collaboration technology that allows organizations to work together to detect and mitigate distributed denial of service attacks.
Officials from the Defense Information Systems Agency discussed the capabilities it requires for network security.
Attacks on the domain name systems are on the rise and can cripple an agency’s network.
The federal government is backing off its demand that states bring their driver’s licenses and state ID cards to federal standards or see their residents face greater hassles at airports.
Juniper Networks responded to the finding of “unauthorized code” in its firewall operating system with a complete replacement of its original controversial random number generator, Dual_EC.
Agency IT managers who believe they do not have the resources to adequately fight cybersecurity threats got some backing from private-sector experts who voiced the same concerns to legislators.
The Department of Homeland Security is accepting applications for its Secretary’s Honors Program Cyber Student Volunteer Initiative.
A derived credentials policy could be applied not just to devices but to specific apps that require a greater level of assurance.
Sophisticated and determined adversaries can take advantage of security weaknesses in online meeting services to obtain access to agency networks and data.
New urgency for state driver's license systems, as air travelers from non-compliant states may soon need new forms of identification to fly.
Looking forward to newer, smarter technologies is not always the most effective strategy for delivering an efficient, nimble and resilient security program. The best advice often is to properly implement the tools and technologies that have been available for years.