secure network (bluebay/Shutterstock.com)

Network security: Age matters less than maturity

Network administrators must ensure that their infrastructures are mature enough to handle the latest threat as well as rapidly changing security requirements.

hacked vehicle (Chesky/Shutterstock.com)

Monitoring 'side channels' to detect vehicle hacks

By comparing what a vehicle is actually doing to what its software claims it is doing, researchers may be able to detect hack to onboard systems.

Phishing

Phishing is still a big problem, but users can help shrink it

If employees have an easy way to spot and report suspicious emails, security teams will get a steady stream of front-line threat intelligence.

las vegas (Business stock/Shutterstock.com)

Hackers love Las Vegas

A new report identifies the least secure cities in the county.

A forward-located Control and Reporting Center. Air Force photo.

Data security at the tactical edge: Rightsizing solutions

As data center functionality moves to the field, data protection capabilities must adapt to address challenges posed by edge deployments.

security compliance

Security fundamentals: Policy compliance

Policy compliance isn’t about the utility or value of what’s actually implemented; it’s about the process of assessment.

Washington state Chief Privacy Officer Alex Alben

Washington shines a spotlight on privacy

Washington state Chief Privacy Officer Alex Alben is helping agencies become more sensitive to privacy concerns surrounding state residents' personal information.

locked network (sdecoret/Shutterstock.com)

7 tips for building an API-secure architecture

An API gateway gives agencies a way to address security challenges specific to data and applications that require open, public access.

What the U.K. Government Digital Service learned about permissions

Login.gov hits 5 million users

The single sign-on portal is helping make government services and applications easier and more secure for the public to access.

phishing (DesignPrax/Shutterstock.com)

Countering the mobile phishing challenge

Mobile endpoint security solutions can help agencies protect government networks from sophisticated phishing attacks targeting employees' devices.

NIST starts down road toward IoT encryption

Before it can solicit encryption algorithms for internet-of-things devices, the National Institute of Standards and Technology wants comments on the best way to design criteria to evaluate those new encryption standards.

By andriano.cz stock illustration ID: 319582172

A cybersecurity credit score

The score provides device-level vulnerability insight for patch prioritization and can facilitate communication with less tech-savvy execs.

Topic Resources

  • Security in the Cloud: Moving Beyond Compliance

    Creating a fully compliant cloud-based system is hard enough, but even that doesn’t go far enough to ensure security. As federal agencies are migrating to the cloud, some are learning best methods for creating a cloud-based security model they can trust...

  • Case Study: City of Fayetteville

    What if you could find out what animals needed attention at the animal shelter, which sporting equipment was used most frequently in the city gym, which parking garage spaces were available most often, and when traffic was the busiest around city hall — all in a matter of minutes, from anywhere? Although this may sound futuristic, government organizations, like the city of Fayetteville, are already using technology to solve for these questions, and much more.

  • PixelNet 2.0: The Pixel Perfect Platform

    On a large corporate campus for a major hardware manufacturer, the ability to display and manage audiovisual data is paramount. From real-time operations room video and security camera footage, to lobby signage, to streaming data and other A/V applications in conference rooms across multiple buildings, critical operations rely on accurate, real-time video data.

  • Accelerate and Maintain NIST 800-171 Compliance

    The Department of Defense (DoD) requires all contractors that process, store or transmit Controlled Unclassified Information (CUI) to have met the Defense Federal Acquisition Regulation Supplement (DFARS) minimum security standards by December 31, 2017 or risk losing their DoD contracts.3

  • Easing the Burden of Compliance

    Achieving and maintaining compliance continues to be a top priority for state and local governments. This is especially true when it comes to cybersecurity-related mandates. The processes for ensuring compliance remain a significant challenge because of new and evolving regulations and requirements. Agencies also struggle with reduced staff and budgets to ensure compliance. This eBook examines the current compliance landscape and how technologies like data encryption can help.


More from 1105 Public Sector Media Group