cell phone conversation

BlackBerry's encrypted mobile service gets NSA approval

SecuSUITE for Government provides end-to-end encryption of voice calls and messages.

blockchain (Elnur/Shutterstock.com)

Illinois blockchain pilots take shape

The Illinois Blockchain Initiative is moving forward with five use cases that demonstrate how the distributed ledger technology can work in government.

internet of things devices behind open door

Locking down networks when IoT opens the door

Understanding the baseline operations of networks and internet-connected devices goes a long way to securing systems, execs say.

hacking emergency services

Hacking emergency services: How safe is the 911 system?

Recent breaches in Ohio, Texas and Washington, D.C., illustrate the cybersecurity vulnerabilities of 911 centers and other emergency services infrastructure.

key on keyboard (Photo travel VlaD/Shutterstock.com)

A brief history of GnuPG: Vital to online security but free and underfunded

Relative to the increased computational power available today, PGP cryptography is as strong today as it was in 1991.

security using artificial intelligence

Malware protection for air-gapped systems

Dell's Endpoint Security Suite Enterprise now features artificial intelligence and machine learning to identify threats at the end points, eliminating the need for signature-based solutions.

open doors to cloud (Sergey Nivens/Shutterstock.com)

The move to cloud: It's easier than you think

Automated cloud compliance can simplify and streamline continuous monitoring.

Hartford, CT (mandritoiu/Shutterstock.com)

Connecticut maps out cyber strategy

The state's goal is to reduce the likelihood and severity of large cyberattacks by strengthening the awareness and resilience of public and private entities.

ghost in the data center

Security specter still haunts cloud computing

Security for cloud services is improving, but some significant hurdles remain, security experts say.

federal blockchain

GSA ramps up blockchain exploration

The U.S. Federal Blockchain Forum will give stakeholders an opportunity to develop, share and discuss practical use cases for blockchain technology for agency missions.

nuclear power plant (vlastas/Shutterstock.com)

Info sharing takes a hit in nuclear breach notification

Alerts of a recent spear-phishing attack may have damaged information sharing between government and critical infrastructure owners, experts say.

computer hack (MARCUSZ2527/Shutterstock.com)

Gloomy cyber forecast from Black Hat

IT pros at the annual security conference expect a successful cyberattack on U.S. infrastructure in the next two years.

Topic Resources

  • Take Cybersecurity to the Next Level

    A top challenge for every government agency today is the effective management of cybersecurity risks. Protecting government information and citizens’ personal data has become more challenging as our networks and the amount of data on them has grown exponentially. In this Executive Insights, you’ll learn how a risk-based approach leveraging automation can provide a solid foundation to your agency’s cybersecurity posture.

More from 1105 Public Sector Media Group