hacker (Dmitry Tishchenko/Shutterstock.com)

Tracing the sources of today's Russian cyber threat

Some of the most talented and dangerous cyber warriors and criminals come from Russia, a long-time meddler in other nations' digital systems.

Los Angeles is launching Cyber Lab

LA launches Cyber Lab to share threat data

The public-private partnership will disseminate threat intelligence generated by the Los Angeles Integrated Security Operations Center.

voting (Alexandru Nika/Shutterstock.com)

Defending the 'front line' against election fraud

Counties and local municipalities need help -- and funding -- to defend their election systems from security threats.

whatsapp (dennizn/Shutterstock.com)

End-to-end encryption isn't enough security for 'real people'

Computer scientists must improve security where we are most vulnerable -- on our own devices.

security (nmedia/Shutterstock.com)

7 security projects worth watching

Department of Homeland Security's Science and Technology Directorate is funding development of a number of early-stage security solutions.

facial recognition tech (Artem Oleshko/Shutterstock.com)

Facial recognition tech installed in more airports

So far this summer, five major U.S. airports have added technology to verify the identities of foreign travelers.

network visibility (alphaspirit/Shutterstock.com)

Eliminating network blind spots and preventing breaches

Real-time cyber situational awareness gives agencies network visibility to protect infrastructure and data.

padlock on server cable (Andrey_Popov/Shutterstock.com)

Why state and local government still struggle with cybersecurity

In addition to mitigating malware and phishing attacks, agencies must build domain name system resilience into their risk management programs.

biometric fingerprint (whiteMocca/Shutterstock.com)

Big-time biometrics: India's Aadhaar project

By enrolling its 1.3 billion residents in a biometric ID program, India can transform how citizens, governments and businesses interact.

unlocked padlock on circuit board (wk1003mike/Shutterstock.com)

DefCon hackers made short work of voting machines. Now what?

Even machines not connected to the internet can be hacked, so election officials must ensure they’re using secure technology and locking down the entire voting process.

illuminated box (balein/shutterstock.com)

Announcing the dig IT Award finalists

From mobile security to smarter transit to swarming drones, these 25 projects represent the best of discovery and innovation in government IT.

malware detection (Alexander Yakimov/Shutterstock.com)

Inside the fight against malware attacks

Created by researchers at University of Texas Arlington, the SEMU malware analysis system provides a comprehensive log of malware operations, making it easier for security analysts to understand what the malicious program was supposed to do.

Topic Resources

  • Take Cybersecurity to the Next Level

    A top challenge for every government agency today is the effective management of cybersecurity risks. Protecting government information and citizens’ personal data has become more challenging as our networks and the amount of data on them has grown exponentially. In this Executive Insights, you’ll learn how a risk-based approach leveraging automation can provide a solid foundation to your agency’s cybersecurity posture.


More from 1105 Public Sector Media Group