Google's quantum computer effort housed at NASA's Ames Research Center was another casualty of the government shutdown.
Insiders become threats in part because of a key organizational mistake that allows them opportunities.
Schmidt: Congress' inability to pass legislation that would better define agencies' cybersecurity roles should not be a serious problem, despite a tug of war over who is in charge.
In cybersecurity, where trust is one of the most fundamental pieces in securing and defending networks, many are wondering if the government should rely so heavily on contractors.
The federal government will need 10,000 cybersecurity experts in the near future. But striking the right balance is more complicated than simply recruiting and hiring new employees.
A Meritalk study finds that cybersecurity pros and the users they serve have very different perspectives.
In the rush to secure networks and computers, agencies often overlook the risks inherent in multifunction printers.
As the world increasingly relies on the Internet as part of critical infrastructure, policies to govern cyberspace are beginning to emerge in numerous countries. A Brookings Institution report illuminates and analyzes them, with an eye toward their effects on the broader globalized Internet society.
After more than 30 years, Voyager 1 has left the solar system, still transmitting useful data thanks to long-ago prescient IT choices.
The Defense Department is learning that older hardware, no longer able to perform its original functions and destined for the scrap heap, can often be put to another use.
Following the rocky launch of HealthCare.gov, administration officials and contractors are under fire from Congress.
IBM wants to ensure AWS's latest triumph in the battle to build the CIA's cloud platform is short-lived.