States at odds with feds on data breach proposals

States at odds with feds on data breach proposals

While Congress hashes out a federal standard for data breach notifications, many states are toughening their own reporting laws.

MyID transfers derived credentials to mobile devices

MyID transfers derived credentials to mobile devices

MyID Trusted Authenticator gives Good Technology customers access to a wide range of secure credentials for signing, authentication and encryption.

Google

Google: Let the machines remember the password

Google’s vision for mobile authentication takes security out of the hands of humans and puts it into the devices those humans carry.

digital government trends

5 trends that will shape government IT strategy

Gartner's take on what's driving digitization of government services.

The case for email encryption in local government

The case for email encryption in local government

Encryption ensures that only the intended recipients of a government email would be able to open and read the content and its attachments -- a necessary requirement in health care, education and law enforcement.

Irony alert:  Popular Chinese app protects PII for Wi-Fi users

Irony alert: Popular Chinese app protects PII for Wi-Fi users

The "protection," however, comes from using stolen and shared login credentials.

Office 365 gets additional email protections

Office 365 gets additional email protections

Government agencies running Office 365 can now take advantage of Exchange Online Advanced Threat Protection, a new email filtering service that provides additional protection against malicious attachments and links.

CDM, Einstein aren’t enough, security experts say

To make the next hack of a federal agency less devastating, the Continuous Diagnostics and Mitigation and Einstein programs need complementary data protection tools.

Cyber weapons: 4 defining characteristics

Analysis of recent sophisticated cyberattacks has revealed four common characteristics that help provide a clearer and more useful definition for cyber weapons.

cybersecurity cloud

Compromised IDs, reused passwords and shadow IT make a dangerous mix

With the average public sector employee using more than 16 cloud services, a new study finds, the impact of one compromised account can be immense.

States flex cyber leadership muscle

States flex cyber leadership muscle

New Jersey is the latest state to establish an information-sharing unit, while several other states are trying different tactics.

NIST drafts framework for privacy risk

The framework will help agencies calculate the privacy risk for their IT systems.