health data (everything possible/

A clean bill of health for data security

Government health care institutions and agencies can safeguard their confidential information and lower their risk of data breaches by following best practices around people, encryption and security policies.

security of financial systems

Closing the gap between technology and public policy

States are taking the lead, but are they equipped to address the complex issues of cybersecurity?

personal info under magnifying glass (tadamichi/

Taxing times to fend off cyber fraud

Seeing the tremendous value of personal information on the average tax return, cyber criminals are hitting the IRS, the Department of Education and many businesses in hopes of stealing tax records and data.

tax form (RomanR/

Tax scam: A game of speed and numbers

The IRS might be outgunned in the fight against tax fraud.

communication across the power grid (chombosan/

Getting power to the grid after a cyber attack

DARPA is building a secure network that aims to operate without power or internet connectivity across disparate IT networks and grid infrastructure technologies.

machine to machine communications

Cyber threat info sharing made easier

A more effective machine-to-machine threat information sharing language and platform should speed adoption across industry.

man walking with smartphone

Behavior-based mobile authentication ‘on the horizon’

Technology that monitors how users interact with their devices has been demonstrated by various performers, a DHS cyber expert says.

network security (deepadesigns/

A blueprint for the modern government security operations center

By leveraging automation and analysis tools, government security operations centers can effectively face the new landscape of cyber threats.

secure supply chain

Insiders in the supply chain

An insecure IT supply chain can present as much risk to agencies as an insider exfiltrating data, according to security experts.

phishing attack (wk1003mike/

Business email compromise: Don’t catch that phish!

Safeguarding an agency against email compromise involves both administrative awareness and technical controls, such as email rules, filtering and third-party solutions.


How Pegasus for Android was unmasked

Even with security researchers looking for an Android variant of the iOS spyware, the sophisticated program designed to surveil specific targets managed to hide itself.

data sharing (Vector Tradition SM/

Why threat-data sharing is so hard

Agencies’ different interests in threat tracking, mitigation and prosecution can make it difficult for them to share information related to cyber attacks.

Topic Resources

  • Take Cybersecurity to the Next Level

    A top challenge for every government agency today is the effective management of cybersecurity risks. Protecting government information and citizens’ personal data has become more challenging as our networks and the amount of data on them has grown exponentially. In this Executive Insights, you’ll learn how a risk-based approach leveraging automation can provide a solid foundation to your agency’s cybersecurity posture.

More from 1105 Public Sector Media Group