Technology-spawned information has become too untamed for government to manage it.
The flood of leaks from the intelligence community may be caused in part by classifying too much information as secret.
The Internet of Things offers the potential of a networking revolution. But, while the theory is sound, its realization must overcome many hurdles first.
The Internet of Things will be everything to malevolent cybermarauders. Terrorists, criminals and hackers will have a field day out-innovating the defenders of cyberspace.
The U.S. intelligence community had a good read on the unfolding events in Ukraine and with ISIL in Syria and Iraq. However, even the community's prescience has its limits.
Snowden and Manning have done serious damage to U.S. intelligence capabilities, and adversaries are adjusting their activities in response.
Cyber intelligence sharing must change its nature as well as expand its reach.
Organizations cannot hope to counter cyber intruders if they don't fully understand their own network and why they are targeted.
Food, water, disease and energy increasingly are becoming disruptive to global security. Accordingly, they are moving up the intelligence priority list.
The intelligence community is striving to determine how it can work with industry early, before requirements for capabilities are confirmed, to get out ahead of challenges.
The first U.S. national intelligence strategy in five years is released exclusively in unclassified form.
Demands for "immaculate collection" of intelligence data are putting U.S. national security at risk.
Cyber is the prime concern of the intelligence community, and going forward, every identity problem is a cyber issue.
The Department of Homeland Security is looking to roll out a new central biometric system in the next two to four years.
Strong credentials that people trust will unlock new government and private sector activities. That was the message this morning from Jeremy Grant, senior executive adviser, National Strategy for Trusted Identities in Cyberspace (NSTIC).
Confyrm, GSMA and MorphoTrust win contracts from NSTIC to secure identities better.
Frank Abagnale, whose now-famous criminal exploits during his early years led him to an adulthood protecting the public, explained today what concerns him in terms of security and why people, not technology, need to be the biggest concern.
Biometric identification moved past fingerprints long ago, and the range of modalities is helping the keepers of law and order make a big difference in several ways.
People often don’t know who has their information, how those groups are using it or even if it’s correct.
Driving somewhere unfamiliar and in need of a gas station? Starving but not sure which restaurants are nearby? The free AroundMe app for iOS and Android identifies your location and shows you a complete list of nearby businesses in the category you select.