-
Responders fine-tune apps in back-to-back hurricanes
September 14, 2017 | NewsLessons learned from Hurricane Harvey helped responders improve information sharing to help Irma victims.
-
DHS orders Kaspersky software removed from agency systems
| NewsCiting the potential that the Russian company's products could be used by "malicious cyber actors" to gain access to federal IT systems, the Department of Homeland Security directed agencies to stop using software.
-
Goosing flash for more efficient data centers
September 13, 2017 | NewsMIT researchers have solved flash memory's speed problem, making it possible to reduce power consumption of data center caches by 90 percent.
-
Ransomware defense depends on product upgrades, patches
| NewsIntelligence officials encouraged IT managers to patch software and retire products at the end of their lifecycles.
-
NTIA drafts best practices for patching IoT
| NewsWorking groups are crafting guidance for mitigating security vulnerabilities in internet-of-things devices and applications.
-
Sandia app assesses radiation threats
| NewsInterSpec integrates many radiation analysis tools and resources into a single, easy-to-use mobile or desktop application that delivers real-time assessments.
-
CBP plans 2018 facial recognition rollout
September 12, 2017 | NewsCustoms and Border Protection aims to use facial recognition tech at the top 20 U.S. airports by February 2018, according to a senior agency official.
-
CBP plans 2018 facial recognition rollout
| NewsCustoms and Border Protection aims to use facial recognition tech at the top 20 U.S. airports by February 2018, according to a senior agency official.
-
DARPA enlists bots to fight social engineering
| NewsDARPA wants to take the onus for detecting phishing schemes off the employee by using bots to detect and identify the sources of social engineering campaigns.
-
DARPA enlists bots to fight social engineering
| NewsDARPA wants to take the onus for detecting phishing schemes off the employee by using bots to detect and identify the sources of social engineering campaigns.