When the IoT becomes an agent of the dark side

When the IoT becomes an agent of the dark side

In the wake of the Mirai botnet attack, cybersecurity experts discuss issues with securing the Internet of Things.

Breaking down cybersecurity communication barriers

Breaking down cybersecurity communication barriers

Effective risk management and decision making is about being able to translate the conversation from what’s happening with the technology to how it impacts the mission.

Can feds catch up on IoT?

Can feds catch up on IoT?

Cities have taken the lead on sensor systems, but experts say the federal potential is immense -- if security improves sufficiently.

Simpler sign-on for police officers

Simpler sign-on for police officers

The National Institute of Standards and Technology is looking for a better way for secure laptops in patrol cars.

How LA’s security center combats cyberthreats

How LA’s security center combats cyberthreats

The Los Angeles Integrated Security Operations Center consolidates more than 200 million log records from across 41 departments every 24 hours.

Can the phishing epidemic be stopped?

Can the phishing epidemic be stopped?

Even extensive training is unlikely to transform ordinary workers into hyper-vigilant phishing detectives.

IARPA releases BAA for virtual user environment

IARPA releases BAA for virtual user environment

The Intelligence Advanced Research Projects Activity is looking for a virtual user environment that can support the kind of security analytics required to protect sensitive government users or workloads.

An auditable election system for 2020

An auditable election system for 2020

Travis County, Texas, is working to combine the convenience of electronic voting and the record of paper ballots into one system.

Prioritizing vulnerabilities to fight cyberthreats

Prioritizing vulnerabilities to fight cyberthreats

To stay ahead of adversaries, federal IT decision makers must step back from their day-to-day routines and prioritize their vulnerabilities.

call center tdos

DHS working to protect emergency call centers against denial-of-service attacks

With more government services facing potential cyberthreats, the Department of Homeland Security is working to lower the risk and impact of potential telephone system-based attacks on 911 call centers.

 ‘Clunky,’ low-tech voting system still vulnerable to hacks

‘Clunky,’ low-tech voting system still vulnerable to hacks

A new report outlines a range of vulnerabilities, infiltration points and tactics that could be used to undermine credibility in an election or even manipulate the results.

Continuous risk mandates continuous protections

Continuous risk mandates continuous protections

Updates to A-130 make continuous privacy and vulnerability monitoring responsibilities of every agency.

Topic Resources

  • Take Cybersecurity to the Next Level

    A top challenge for every government agency today is the effective management of cybersecurity risks. Protecting government information and citizens’ personal data has become more challenging as our networks and the amount of data on them has grown exponentially. In this Executive Insights, you’ll learn how a risk-based approach leveraging automation can provide a solid foundation to your agency’s cybersecurity posture.


More from 1105 Public Sector Media Group