Officials at the Cybersecurity Unit, part of the Criminal Division's Computer Crime and Intellectual Property Section, compiled the guidelines based on lessons learned by federal prosecutors handling cyber investigations.
Greg Godbout says that feds should provide a digital experience similar to how Disney has transformed how people interact with its Orlando, Fla., theme parks.
Federal aviation regulators said a new highly advanced computer system that will enable air traffic controllers to more safely and effectively manage high-altitude flights was recently completed.
Jeremy Grant left the National Institute of Standards and Technology April 30 after spending the last four years leading an effort to improve digital identity management nationwide. We caught up with Grant to discuss recent developments with NSTIC, the program's biggest accomplishments and some challenges that lie ahead.
Worldwide collaboration on cybsersecurity is necessary to keep entities safe, but arguments over whether security and privacy are at odds are hampering the effort, an EU official said.
The bill called Aaron's Law is named after Internet entrepreneur and activist Aaron Swartz, who committed suicide in January 2013 at the age of 26 following state and federal indictments two years earlier for unauthorized access to JSTOR.
Project managers didn't consistently follow processes when reporting information to the IT Dashboard website, an Obama administration initiative that allows the public to view details and track the progress of major IT programs across the government.
Digital channels show "paltry use" with less than a fifth of online adults interacting via email and no other channel, including mobile apps, getting higher than 5 percent use.
Cybersecurity should be at the top of the congressional technology agenda, according to a new poll. Forty percent of registered voters believe cyber attack prevention should be lawmakers' technology policy focus.
Federal contractors without background checks, non-disclosure agreements or required privacy training were able to access sensitive data from Army childcare subsidy payment applications that they were hired to process.