More Smart Cities & IoT Articles
Compressing the network traffic sent to central analysis servers may allow analysts to detect intrusions earlier in the transmission process.
As agencies integrate advanced technologies and more security into their processes, they're looking to their employees for help.
Efforts to counter disinformation and influence campaigns, as well as state-sponsored hacking and leaking efforts targeting political campaigns, remain a work in progress.
Most states are addressing privacy issues, and the number of dedicated CPOs is on the rise.
Nation-states and others are targeting critical infrastructure in much the same way they do traditional IT systems.
The full-body scanners at airports across the country frequently give false alarms for Afros, braids, twists and other hairstyles popular among black women.
A new report discusses the suitability of zero-trust networks in government and the challenges implementing those solutions would present for agencies.
Enterprise key management helps agencies using a hybrid cloud -- or multiple cloud providers -- move data into another cloud infrastructure, while retaining access to the keys and managing them across their lifecycle.
At the recent RSA Conference’s Public Sector Day, government CISOs discussed how agencies can embrace innovation while still protecting their networks and assets.
An effective, efficient service desk is an often-overlooked asset that supports the greater IT security infrastructure.
Sign up for our newsletter.