When a high-voltage power line is damaged by wind, ice, or a tree, electricity utilities…
INFRASTRUCTURE & TECHNOLOGY
Scientists have discovered a way to authenticate or identify any object by generating an unbreakable ID based…
Check Point Software Technologies Ltd. on Monday published a 38-pagereport identifying specific details and broad analysis on…
The National Institute of Standards and Technology (NIST) has published a guide to deploying automated application whitelisting…
New report highlights NSF-funded cybersecurity research and education. Today, NSF invests nearly $160 million each…
The Department of Homeland Security (DHS) Science and Technology Directorate (S&T) has awarded two grants for the…
Navigating the Web gets easier by the day as corporate monitoring of our e-mails and…
Privacy advocates have intensified their campaign against the Cybersecurity Information Sharing Act (CISA), which the Senate will…
A controversial amendment to an already-controversial cybersecurity bill will allow U.S. courts to pursue, convict, and jail…
A senior DHS official last Wednesday revealed that a 2013 sniper attack on a Metcalf,…