More Smart Cities & IoT Articles
Real threat hunting requires human intelligence and automated detection and search tools that look through the entire agency to find anomalies that cross boundaries and siloes.
Agencies are making strides to modernize their systems and open access to government data for public use, but they aren't paying close attention to the hidden risks.
So-called "last mile providers" can give enterprise IT buyers greater control, while removing the chaos of decentralized governance.
Training won’t stop every data breach, but it teaches staffers how to detect irregularities and report them.
A hub-and-spoke system can collect and index data from all IT touchpoints in an enterprise network.
Agencies can keep their cloud systems secure -- even with the breakneck speed of DevOps -- by automating security functions in a way that ensures compliance and gives security pros a degree of control.
As agencies revamp their security infrastructure as they modernize, they must look for security solutions based on threat intelligence that illuminates today’s attack vectors and tactics.
Expired Transport Layer Security certificates on dozens of U.S. government websites are rendering them either insecure or inaccessible, a British internet services company reported.
The Defense Advanced Research Projects Agency is investigating whether "dielets" -- tiny chips no larger than 100 microns a side -- can help track and authenticate electronics components.
The growth of unsecured devices such as industrial sensors, webcams, televisions and other smart home devices is leading to a growing disruptive capability.
Sign up for our newsletter.