-
WhiteHouse.gov: The case of the broken links
January 27, 2017 | NewsWhat really happened in the digital transition from Obama to Trump -- and where archival efforts still need to improve.
-
Using deception technologies to thwart attacks and reveal targets
| NewsUsing intelligent deception, IT security teams can not only deflect attacks, but they can also detect what invaders are looking for and ultimately identify the cyber criminals and stop the attack.
-
Army Reserve pilots management tool for cyber talent
January 26, 2017 | NewsWorking with Carnegie Mellon University, the Army Reserve has developed the Cyber Warrior Database, a master repository to track the skills soldiers acquire in their civilian jobs and match them to potential military applications.
-
Army Reserve pilots management tool for cyber talent
| NewsWorking with Carnegie Mellon University, the Army Reserve has developed the Cyber Warrior Database, a master repository to track the skills soldiers acquire in their civilian jobs and match them to potential military applications.
-
Explaining cybersecurity threats in a decision-maker context
| NewsCyber professionals must help decision makers understand the nature, impact and context of vulnerabilities so they understand the available courses of action, their relative costs, impacts and benefits.
-
Making fingerprints more reliable biometrics
| NewsThe intelligence community's research arm is working on detecting fake fingerprints and developing devices to collect fingerprint data without a human operator.
-
Governors put cybersecurity, broadband on front burner
January 25, 2017 | NewsAt the National Governors Association winter meeting, Govs. Terry McAuliffe and Brian Sandoval both spoke about opportunities for the federal and state governments to work together and across the aisle.
-
Voting infrastructure protections need fleshing out
| NewsThe independent federal commission that helps states improve their voting systems wants more clarity on what DHS' critical infrastructure designation means.
-
Machine learning tool helps county detect cyber risks
| NewsOfficials in Livingston County, Mich., turned to a machine learning tool that can find anomalies in user and device behaviors without previous knowledge of what to look for.