More Smart Cities & IoT Articles
Agencies must be proactive and have measures in place to protect against potentially vulnerable devices introduced into their networks.
The Intelligence Advanced Research Projects Activity wants software that can autonomously inspect a deep neural network and predict if it has a Trojan that could trigger a malfunction.
A quantum computer that can crack today's state-of-the-art encryption algorithms is more than a decade off, according to the National Academies.
Gains in the accuracy of facial recognition technology over the last four years have been "revolutionary and not evolutionary," according to an expert from the National Institute of Standards and Technology.
In a world of real adversaries and malicious attackers, government can no longer live with employees' unforced errors.
Department of Homeland Security is calling on entrepreneurs and small businesses to help improve its emergency response, law enforcement, border protection and cyber risk management capabilities.
As emergency communications move to wireless broadband networks, the National Institute of Standards and Technology drafts a report that analyzes the cybersecurity of mobile and wearable devices.
Unlike in border control applications -- where the environment is controlled -- when supporting street policing, facial recognition algorithms make suggestions about possible similarities to police who must then confirm or refute them.
Leaked or stolen data is typically very public, but simple changes to a system are hard to detect even with a highly trained eye.
The Agency-Wide Adaptive Risk Enumeration algorithm is already ingesting data, and the Department of Homeland Security plans to put it into production heading in FY2020.
Sign up for our newsletter.