Emerging Tech

Justice is Crafting a Body Camera Catalog for Local Police Forces

Data protection and privacy controls are scattered throughout the seven-page list of characteristics that will be included in the guide.

Cybersecurity

Watchdog: Treasury hitting the mark as cyber steward

In its mission to help protect the nation's critical financial infrastructure, the Treasury Department is covering the bases, according to a new audit report.

Cybersecurity

What DIUx might mean for intel

The intelligence community wants to build on the Pentagon's effort to get private-sector innovators involved earlier in the acquisition cycle.

Cybersecurity

State's school for cyber

Training 130 State Department foreign service officers on cyber is expensive but critical.

Cybersecurity

After ISIS, Americans Fear Cyberattacks the Most

Nearly three in four people consider them a major threat to the U.S.

Cybersecurity

GAO: FEMA needs framework to improve IT systems

According to the Government Accountability Office, FEMA needs to develop a governing framework for the oversight and modernization of IT investments.

Cybersecurity

Developers Keep Leaving Secret Keys to Corporate Data Vulnerable on GitHub

The hackers who stole data on 50,000 Uber drivers in 2014 didn’t have to do much hacking at all.

Cybersecurity

IG: ICE IT system deficiencies threaten data integrity

Deficiencies in Immigration and Customs Enforcement's general IT controls could jeopardize the privacy and integrity of critical financial and operational data, according to a new report.

Cybersecurity

DHS ramping up info-sharing work with industry

DHS is planning new guidance that will help the private sector better share cybersecurity information with the government.

Cybersecurity

Quantum Computers Will Break Today’s Cyber Protections, Scientists Say

True quantum computers don't exist yet, but cryptography needs to evolve for when they do, according to NIST scientists.

Cybersecurity

The Military Is Building an Engine to Uncover the Humans Behind Hacks

The point is "to not only look at the bullets but also look at the weapon,” a DARPA researcher tells Nextgov.

Cybersecurity

Report: CBP lacks 'clear authority' to collect SSNs for system access

U.S. Customs and Border Protection derives employee and contractor IT systems passwords from user Social Security numbers. But the agency may not have the authority to collect that personally identifiable information, according to a privacy report.

Cybersecurity

Agencies unveil plan to encourage development of smart gun technology

New report outlines a strategy to encourage the development and use of smart gun technology by government, with the goal of reducing gun violence.

Ideas

How Multifactor Authentication Can Play a Role in the Cybersecurity National Action Plan

Imagine how much more efficient high-security financial processes could run within the government if employees could use information determined by physical elements of the user’s body, such as a fingerprint or retina, or proximity to wireless devices.