Skip to Content
Back to top
Researchers should focus on when humans need to be in the loop and when machines can take charge.
The severity of the weaknesses isn’t clear from the annual report summary.
The other options for deterring cyberattacks aren't much better, though.
They're also spoofing tax preparers' websites, security researchers said.
These complex vulnerabilities can't be patched overnight.
For one, the department will be setting up a bug bounty program.
Kaspersky Lab calls it a masterpiece.
The annual FISMA report shows where the Homeland Security Department—the government’s point agency on cyber issues—can improve its own information security.
The public sector can, and should, play a larger role in helping ensure massive breaches don’t happen again.
Robust internal networks will keep the military and government operating, says Putin’s top IT advisor.
, Defense One
A bill to study retro approaches to preventing and mitigating the effects of cyberattacks is advancing in the Senate.
As agencies look to modernize, they can take the opportunity to make sure all their software is working together.
About half of victims who ponied up the ransom never got their data back.
A White House cyber policy official and a cybersecurity professor both encourage students to broaden their studies beyond technology and coding.
Get your password game right.
Poorly engineered artificial intelligence is more likely to keep Jason Matheny up at night than a program becoming sentient.
The way OPM contracted for credit monitoring services has come under scrutiny.
Lockheed previews its response to a Pentagon quest for a tool to coordinate cyber effects in the land, air, sea and space domains.
, Defense One
These hackers are killing two birds with one stone.
Help us tailor content specifically for you: