Jumping on the blockchain bandwagon

Creating a blockchain playbook for government

A blockchain primer gives agencies a foundational understanding of the distributed ledger technology.

fraud investigation (Shutterstock.com)

Tracking down 'most wanted' insurance fraud suspects

Because it can take a long time to track down alleged insurance scammers who fail to appear in court, some state insurance officials say placing them on an online most wanted list, just like the FBI and U.S. Marshals Service do, can be a useful tool.

phishing (wk1003mike/Shutterstock.com)

Why phishing attacks are increasingly targeting the public sector (and what you can do about it)

Many agencies rely on legacy email security solutions that fail to address today's sophisticated phishing attacks.

HHS tightens FISMA compliance, but risks remain

Unsupported software threatens medical devices, networks

Unpatched known vulnerabilities can open agencies up to internet of things based attacks and ransomware, according to a senior HHS official.

tech budget

Budgeting for security products: What CISOs need to know

Chief information security officers must consider the threat surface, the adequacy of legacy products and the availability of innovative security solutions to decide how secure their agencies.

government cloud solutions

Azure Government beefs up security solutions

Microsoft is adding more capabilities for classified data and strengthening security management in Azure for government cloud customers.

Cyber attack on network

Attackers hijack state agency server for malware

Online criminals were able to surreptitiously plant malicious code on government servers in at least one state to create a "malware infection chain" likely to dupe other targets.

GCN dig IT awards

Congratulations to this year's dig IT award winners

From mobile security to telehealth to smarter and more resilient infrastructure, these five projects represent the best of discovery and innovation in government IT.

frustrated manager

5 mistakes to avoid after a cybersecurity breach

Given the vast attack surfaces of today's systems, intrusions are nearly inevitable, but they don't have to be catastrophic.

connected home user (Nuttapol Sn/Shutterstock.com)

One-stop shopping for state services on its way

A single portal that offers online services seamlessly would lower costs for states and make transactions easier for the public.

Aging voting machines cost local, state governments

Report details election vulnerabilities uncovered at DEFCON

A new report provides a detailed look at just how vulnerable the entire election system is to hacking and urges policymakers to shore up security gaps.

responders at a house fire (Ronald Caswell/Shutterstock.com)

Secure communications across radio and cell networks

With mobile security technology added to Lockheed's Universal Communications Platform, secure communications networks can be extended to commercial smartphones.

Topic Resources

  • Take Cybersecurity to the Next Level

    A top challenge for every government agency today is the effective management of cybersecurity risks. Protecting government information and citizens’ personal data has become more challenging as our networks and the amount of data on them has grown exponentially. In this Executive Insights, you’ll learn how a risk-based approach leveraging automation can provide a solid foundation to your agency’s cybersecurity posture.