More Smart Cities & IoT Articles
New York City's Cyber Command built an open-source, cloud-based data pipeline -- a security log aggregation platform that analysts use to quickly detect and mitigate cyber threats.
Liveness detection reduces the risk of spoofing by using advanced technologies ensure that biological identifiers are from the proper user and not from someone else.
Despite enthusiasm for more privacy rules by legislators and their constituents, many states found themselves bogged down this year in both the details of high-tech operations and industry complaints.
With secure SD-WAN, agencies not only enjoy greater visibility and management across their network environments, but access to an integrated security infrastructure.
The Defense Department inspector general found that contractors were not consistently adhering to DOD's cybersecurity standards.
Employees and contractors must learn to keep their agencies’ data safe and protect themselves from becoming virtual puppets of enterprising hackers.
Users will benefit from secure and feature-rich applications that can defend against the latest cyberthreats and help deliver on mission goals.
When organizations in all sectors apply cybersecurity best practices, they raise the overall level of cyber hygiene, making everyone safer both online and off.
Remote browser isolation protects users by moving all web-based activity to a disposable cloud container.
A new report details how states have used federal funding to secure voting systems -- and what still needs to be done.
Sign up for our newsletter.