A new breed of threat is taking a different approach, setting up fake websites and apps that appear to be legitimate, but can be extremely dangerous to anyone fooled into trusting them. NextGov investigates those threats aimed at the United States Postal…
Two years after a data breach at OPM compromised personal information of tens of millions of current and former federal employees, agencies need to move from making short-term fixes to implementing long-term strategies. Learn how at Tenable Network Security.
The latest NextGov Emerging Tech column takes a look at several states that are supporting new driverless vehicle programs, and discovers the places where tractor trailers without drivers will soon be hitting the roads.
President Trump signs the long-delayed executive order on cybersecurity.
Rapidly evolving cybersecurity solutions can generate so many alerts that analysts and administrators can be overwhelmed. Standardizing, prioritizing and automating can make alerts manageable.
The innovative integrators at InfoZen know how to modernize IT for government agencies. The TWB recently interviewed their experts to create an amazingly detailed guide about how to modernize IT systems in the key areas of Cloud, DevOps, Cybersecurity and Mission Critical…
We wanted to see if the alleged hacking tools the CIA is supposedly using did in fact exist, or if doing things like turning TVs into spy devices was possible. So we loaded up some hacking tools and went to work. Find…
Automation could be the answer to feds dealing with constant attacks, reducing the time from detection to remediation from months to seconds. The basic concept is simple enough, simply using the power of the network itself to counter threats, but the reality…
The recent women’s march on DC showed the limitations of smartphone technology. During a crisis or an emergency, or in this case a massive protest march, cellular service can become overloaded. Here is what we need to do about that.
The growing complexity of IT enterprises and the cyberthreats facing them have eroded governments’ confidence in their ability to assess and mitigate cybersecurity risk, according to the latest Global Cybersecurity Assurance Report Card. The ability to see infrastructure and monitor activity is…
