Cybersecurity

5 key IT bills still pending in Congress

Lawmakers continue to wrestle over issues related to cybersecurity, privacy and procurement reform.

Cybersecurity

Ex-Worker Pocketed Employer’s Patient Data to Start Rival Firm

Healthcare and Public Health // Kentucky, United States

Cybersecurity

Do We Need to ‘Disrupt’ the Cybersecurity Status Quo?

Next month marks 10 years since DHS first marked Cybersecurity Awareness Month. Is the cyber conversation stuck in 2004?

Cybersecurity

What if Police Body Cams Get Hacked?

This seemingly easy fix opens the gates to a flood of questions over the cameras' vulnerabilities.

Modernization

Apple’s New Predictive Text Apparently Reveals Passwords

The concern is that if anyone else gets hold of your iPhone, that person potentially could find and use all of your passwords.

Cybersecurity

Jimmy John’s Hack Only Recently Was Stopped

Financial Services // Food and Beverage

Digital Government

FBI Can’t Find Files After Spending $550M to Digitize Them

Fumbling with computerized case-management system leaves less time for investigations, IG says.

Cybersecurity

Disarray or Dream Team? DHS Cyber Efforts Under Scrutiny

DHS insists it’s building a strong cyber team, but spate of departures loom large.

Cybersecurity

NGA's Long on transparency, the workforce and the power of GEOINT

The first woman to head a major U.S. intelligence agency goes on the record about the highs and lows of the job.

Cybersecurity

Second Nude Data Dump Nets Kim Kardashian

Technique likely similar to J.Law hack, where Apple security protections apparently were bypassed.

Cybersecurity

How the Encryption Revolution Almost Didn’t Happen

The idea of public-key cryptography is surprisingly simple, once you've figured it out.

Cybersecurity

Online privacy: It's time for a new security paradigm

Trust management enforces granular privacy, security and organizational policies for gathering and protecting personally identifiable information.