More Smart Cities & IoT Articles
Controlling unauthorized internet-of-things devices that connect to enterprise networks requires a different technical approach than BYOD management because IoT devices often lack authorization and authentication tools.
While large defense contractors typically have robust security measures in place, the smaller and medium-sized companies they subcontract with do not, making them prime targets of nation-state hackers.
Intelligence Advanced Research Projects Agency's High ClaaS (for classified as a service) program encourages development of technologies that would allow highly isolated computing tasks to be run on shared commercial clouds.
No single defense can protect every part of a democratic system and society, so elections officials must evaluate what attackers are likely to be after and what’s at stake.
The risk-scoring algorithm will help agencies prioritize mitigation activities and improve their basic cybersecurity hygiene.
For all the focus on government's inability to compete with private-sector pay, the exact dollar figure, while important, isn't disqualifying.
A "handful" of federal agencies still have yet to fully comply with a January 2019 emergency directive on DNS tampering, according to a Department of Homeland Security official.
Behavioral analytics and chipset-based security will be central to the way government manages identity verification.
Regulation can also slow advances the public finds wrong, distasteful or unhelpful to the improvement of society.
The 2018 Federal 100 Award winners includes many whose accomplishments have improved cybersecurity in government.
Sign up for our newsletter.