Google

Google: Let the machines remember the password

Google’s vision for mobile authentication takes security out of the hands of humans and puts it into the devices those humans carry.

digital government trends

5 trends that will shape government IT strategy

Gartner's take on what's driving digitization of government services.

The case for email encryption in local government

The case for email encryption in local government

Encryption ensures that only the intended recipients of a government email would be able to open and read the content and its attachments -- a necessary requirement in health care, education and law enforcement.

Irony alert:  Popular Chinese app protects PII for Wi-Fi users

Irony alert: Popular Chinese app protects PII for Wi-Fi users

The "protection," however, comes from using stolen and shared login credentials.

Office 365 gets additional email protections

Office 365 gets additional email protections

Government agencies running Office 365 can now take advantage of Exchange Online Advanced Threat Protection, a new email filtering service that provides additional protection against malicious attachments and links.

CDM, Einstein aren’t enough, security experts say

To make the next hack of a federal agency less devastating, the Continuous Diagnostics and Mitigation and Einstein programs need complementary data protection tools.

Cyber weapons: 4 defining characteristics

Analysis of recent sophisticated cyberattacks has revealed four common characteristics that help provide a clearer and more useful definition for cyber weapons.

cybersecurity cloud

Compromised IDs, reused passwords and shadow IT make a dangerous mix

With the average public sector employee using more than 16 cloud services, a new study finds, the impact of one compromised account can be immense.

States flex cyber leadership muscle

States flex cyber leadership muscle

New Jersey is the latest state to establish an information-sharing unit, while several other states are trying different tactics.

NIST drafts framework for privacy risk

The framework will help agencies calculate the privacy risk for their IT systems.

4 ways federal IT pros can help their networks – and themselves – thrive

4 ways federal IT pros can help their networks – and themselves – thrive

Six nines of uptime is certainly achievable with a little bit of simplification and planning -- and a whole lot of technology and teamwork.

Security tools top the list of AWS add-ons

Security tools top the list of AWS add-ons

According to a recent survey by 2nd Watch, security tools were the most popular third-party purchase for Amazon cloud deployments.

Topic Resources

  • GameChanger: Microsegmentation

    In less than a decade, more than 87 million records with sensitive or private information have been exposed due to cyber-incidents on federal networks alone. Increasingly, organizations are beginning to realize that perimeter-based security just isn’t enough anymore. Download to learn how for many data centers, the solution is microsegmentation.


More from 1105 Public Sector Media Group