Security Research

House Committee to Hold Hearing on the Online Exploitation of Veterans

A veteran, a scientist and representatives from Facebook and Twitter are all set to testify.

A Plan to Engage Hackers in Election Security

The Information Technology-Information Sharing and Analysis Center wants to create a coordinated vulnerability disclosure program that could alert vendors about security flaws in their voting systems.

CISA, DARPA Offer Look Into their Dealings with Deepfakes

Agency and industry officials outlined their approaches to disinformation campaigns ahead of election 2020.

The Energy Department Is Transforming a Cyber Competition into a Hiring Tool

Top down leadership and a dedicated national lab team are helping the department embrace a new approach to closing the workforce gap.

The Market for Voting Machines Is Broken. This Company Has Thrived in It.

Half the country votes on machines made by ES&S. Many experts and election officials say the manufacturer remains dominant because there’s little government regulation and almost no oversight.

Who Wants to Hack the Army Again?

Active U.S. military, federal civilians and individuals invited by HackerOne can participate in the service’s second bug bounty.

Report: Cyber Criminals Target More Firms in Search of Bigger Paydays

Tech, telecom and professional services companies are the most popular targets for nefarious online actors, according to researchers at CrowdStrike.

DHS is Struggling to Coordinate Its Sprawling Research Efforts

Poor oversight and shoddy data management have left the DHS Science and Technology Directorate unprepared to invest in the future, according to the agency's inspector general.

9 Tips to Help Secure Every Federal Employee’s Mobile Device

Bad actors increasingly target smartphones and endpoint devices that are generally less protected than government computers.

Featured eBooks

Critical Update: How Hackers Get Stuck In HADES

For the fourth season of Critical Update, the Nextgov team is diving into the latest developments in cybersecurity, beginning with the world’s biggest honeypot.

Twitter Bots Are Becoming More Human-Like: Study

In 2016, they were mostly retweeters on timers. Now they’re gathering intelligence.

Apple iPhones Could Have Been Hacked for Years—Here's What to Do About It

As there is no visible sign of infection on the device, it is likely users are completely unaware of the risks they’re facing.

This Site Shows the Security Risks of Your Smart Devices

A new website can help you understand the security risks internet-connected devices might bring into your home.

Pentagon, NSA Laying Groundwork for AI-Powered Cyber Defenses

Officials are developing a consistent framework for collecting cyber data, which could ultimately help train tools to monitor networks and detect suspicious behavior.

The Trump Administration’s Plan to Usher in ‘Second Bold Era’ of Science and Technology

The administration’s lead budget and science policy shops released an outline of funding priorities to maintain America’s competitiveness through research and development of new technologies.

The Pentagon Is Exploring New Ways to Isolate Its Networks

Three companies have already received multimillion-dollar contracts to explore new ways to protect the data flowing through the military’s IT systems.