More Smart Cities & IoT Articles
The Information Trust program would leverage machine learning and blockchain for user authentication and sharing trust information.
A prototype solution moves web browsing from the desktop to the cloud, effectively putting an “air gap” between the internet and enterprise networks and improving bandwidth utilization.
The Massachusetts Army National Guard is building a cyber and network security themed escape room it can take to schools to get students interested in cybersecurity.
The dashboard will tap intelligence, machine learning and CDM's vast stores of data.
Sloppy digital security practices are still evident in the major U.S. political parties, according to a report from Security Scorecard.
San Francisco's ban on facial-recognition puts the city at risk of not only falling behind on technological innovation, but returning digital workflows to manual processes, experts say.
Although the security updates to the Election Assistance Commission's new Voluntary Voting System Guidelines 2.0 are sorely needed, the approval and updating process can't keep up with technological changes.
By transforming the mobile platform into a self-contained, privacy-protecting authentication machine, local identity verification can be practical and secure.
The inevitable blending of traditional warfare and cyber warfare will pose intellectual and regulatory challenges that will get more complicated as technology develops.
As the Senate warned against potential threats to 5G security from Chinese companies, the Trump administration issued an executive order declaring foreign supply chain threats to the U.S. telecommunications system a national emergency.
Sign up for our newsletter.