cybersecurity concerns SCADA cloud systems

A security checklist for SCADA systems in the cloud

Because supervisory control and data acquisition systems manage critical infrastructure, acceptance of risks in cloud-based SCADA system controls should approach zero.

Army upgrading cryptograhic equipment

Army makes headway on cryptographic equipment upgrades

The Army is continuing with updates to its cryptographic devices as part of the Army-Wide Cryptographic Network Standardization.

weighing the pros and cons of encryption

Lessons from the ‘Crypto Wars’

A new report draws parallels to the battles over security and encryption between the government and privacy advocates in the 1990s to the current struggle in the wake of the Snowden releases.

IRS, industry to share data to fight tax fraud

IRS, industry to share data to fight tax fraud

The Internal Revenue Services has joined forces with state government and industry groups to strengthen taxpayer authentication and protect identity.

Report: Government software flawed, rarely fixed

Report: Government software flawed, rarely fixed

Most government software fails basic security screening, a new report finds. Even worse: government agencies lag far behind other sectors when it comes to fixing flaws once they're found.

NIST issues guidance for CUI in non federal systems

NIST: Protecting data after it's left your network

The National Institute of Standards and Technology published the final version of its guidance to ensure that sensitive federal information remains confidential even when stored in nonfederal systems.

NIST updates specs for next-gen PIV cards

NIST updates specs for next-gen PIV cards

New specifications add security features to verify identities and work with mobile devices.

What can your agency learn from the CDM rollout at DHS?

What can your agency learn from the CDM rollout at DHS?

Agencies can gain valuable insight on the logistics of the Continuous Diagnostics and Mitigation program from the Department of Homeland Security’s experience with Phase I implementation.

DOD seeks to scrub PII from 16 years

DOD seeks to scrub PII from 16 years' worth of video

The Defense Media Activity is looking for help in removing personal identifiable information from video content created between 1995 and 2011.

Marshals hunt down device to ID suspects in the field

Marshals hunt down device to ID suspects in the field

A hand-held biometric device would help agents who encounter a suspect in the field who either has no identification or who tries to mask his identity.

States at odds with feds on data breach proposals

States at odds with feds on data breach proposals

While Congress hashes out a federal standard for data breach notifications, many states are toughening their own reporting laws.

MyID transfers derived credentials to mobile devices

MyID transfers derived credentials to mobile devices

MyID Trusted Authenticator gives Good Technology customers access to a wide range of secure credentials for signing, authentication and encryption.


More from 1105 Public Sector Media Group