Federal authorities indicted three Chinese hackers for operations that allegedly stole trade secrets from corporations.
Full implementation of technology needed to track visa holders leaving the U.S. could be ready at airports across the U.S. in the next four years, but cooperation from airlines is key.
The data, including a virtual hard drive containing classified Army documents, was for a time unsecured and available for anyone to download.
Making cyber a combatant command is sign of the Pentagon's priorities, but it will take collaborative leadership to facilitate cyber readiness, says an Air Force cyber leader.
A former Obama administration cybersecurity official wants a single agency to take the lead on generating and enforcing security standards for technology products.
Former federal CIO Tony Scott explains why agencies must kick their addiction to custom code.
An ICE intel memo claims that a Chinese UAS maker is dumping cheap drones on the U.S. market to capture sensitive infrastructure data.
Federal websites continue to slip on performance metrics related to page-load speed, mobile friendliness, security and accessibility, an ITIF report finds.
Clear business cases, careful user interviews and strategic outside alliances can be far more important than the technology itself.
Congress is looking to boost an ongoing project to aggregate U.S. coastal mapping data.
Amazon Web Services' new AWS Secret Region promises security that meets secret classification requirements.
The Pentagon is sitting on a hoard of data but doesn't know what to do with it. A new report makes the case that artificial intelligence is the solution.