Army's MORPHINATOR: A shape-shifting approach to network defense
The cyber maneuver technology would randomize configurations and other aspects of a network to fool and foil intruders.
The cyber maneuver technology would randomize configurations and other aspects of a network to fool and foil intruders.
Illinois center will include more military commands, educational institutions and other federal agencies.
Senators' claims that critical infrastructure is vulnerable to a "few keystrokes" belie its resilience and obscure the real threats.
Esri's GIS public information maps will be made accessible on Microsoft's cloud-based disaster portal.
The Basic Input/Output System that boots a computer could be an attractive target for sophisticated exploits, and the complexity of servers creates specific challenges that NIST addresses in new security guidelines.
DARPA seeks proposals for new software that can scour social media and other sites to predict cyberterrorism events.
NIST offers practical guidance on intrusion detection and prevention systems to help counter the new breed of stealthy, targeted attacks.
Just 56 percent of federal executives said IT helps support their daily operations.
Top state IT leaders have adopted a new strategic plan aimed at putting a stronger emphasis on CIO leadership.
At Black Hat, Apple's security chief gave a rare look into how the company hardens its iOS operating system.