communication across the power grid (chombosan/Shutterstock.com)

Persistent attacks target critical infrastructure, US-CERT says

Attacks have been targeting domain controllers and file and email servers of critical infrastructure systems, according to the U.S. Computer Emergency Readiness Team.

secure keys (shutterstock.com)

SSH keys: The elephant in the compliance room

Poor SSH key management can open agencies to threats and compliance audit failures.

compliance (EtiAmmos/Shutterstock.com)

Agencies love the Cybersecurity Framework, but loathe compliance

Automated processes can make compliance headaches a thing of the past.

Blockchain (a-image/Shutterstock.com)

Microsoft adds blockchain services to Azure Government

Microsoft brings its business capabilities for blockchain to the Azure Government cloud.

secure connection (supimol kumying/Shutterstock.com)

Commerce to leverage NOAA's TIC

Several bureaus at Commerce will be getting Trusted Internet Connection access from the National Oceanic and Atmospheric Administration.

Jumping on the blockchain bandwagon

Creating a blockchain playbook for government

A blockchain primer gives agencies a foundational understanding of the distributed ledger technology.

fraud investigation (Shutterstock.com)

Tracking down 'most wanted' insurance fraud suspects

Because it can take a long time to track down alleged insurance scammers who fail to appear in court, some state insurance officials say placing them on an online most wanted list, just like the FBI and U.S. Marshals Service do, can be a useful tool.

phishing (wk1003mike/Shutterstock.com)

Why phishing attacks are increasingly targeting the public sector (and what you can do about it)

Many agencies rely on legacy email security solutions that fail to address today's sophisticated phishing attacks.

HHS tightens FISMA compliance, but risks remain

Unsupported software threatens medical devices, networks

Unpatched known vulnerabilities can open agencies up to internet of things based attacks and ransomware, according to a senior HHS official.

tech budget

Budgeting for security products: What CISOs need to know

Chief information security officers must consider the threat surface, the adequacy of legacy products and the availability of innovative security solutions to decide how secure their agencies.

government cloud solutions

Azure Government beefs up security solutions

Microsoft is adding more capabilities for classified data and strengthening security management in Azure for government cloud customers.

Cyber attack on network

Attackers hijack state agency server for malware

Online criminals were able to surreptitiously plant malicious code on government servers in at least one state to create a "malware infection chain" likely to dupe other targets.

Topic Resources

  • Take Cybersecurity to the Next Level

    A top challenge for every government agency today is the effective management of cybersecurity risks. Protecting government information and citizens’ personal data has become more challenging as our networks and the amount of data on them has grown exponentially. In this Executive Insights, you’ll learn how a risk-based approach leveraging automation can provide a solid foundation to your agency’s cybersecurity posture.


More from 1105 Public Sector Media Group