encrypted data in the cloud

Computing with encrypted data

Researchers are working on ways to optimize fully homomorphic encryption, which allows manipulation of encrypted data, for real-world applications.

investigation (alphaspirit/Shutterstock.com)

Cybercrime investigation: Where geek meet gumshoe

A new publication outlines a standard for investigating and preventing today’s complex and sophisticated cybercrime.

broken lock (By Sergey Nivens/Shutterstock.com)

US-CERT urges fast patch to Samba vulnerability

The newly announced flaw has lurked in the popular open-source software for years.

people voting in California

DEFCON to target voting machines

This summer’s hacker conference will give attendees a chance to apply their skills to manipulating voting machines.

facial recognition (Zapp2Photo/Shutterstock.com)

House committee looks into cities’ facial recognition tech

The House Committee on Oversight and Reform has sent letters to big-city mayors asking for documentation on their systems.

secure network (bluebay/Shutterstock.com)

White House aims to harden agency networks

President Donald Trump’s recent executive order on cybersecurity means the White House will take a hard look at eliminating weak links in federal networks.

black hat, gray hat and white hat hackers (By MatiasDelCarmine/Shutterstock.com)

An ethical hacker can help you beat a malicious one

Organizations that engage the services of an ethical hacker can find and fix vulnerabilities on their systems rather than have them exploited.

cybersecurity (By deepadesigns/Shutterstock.com)

The one fix needed to keep Trump's cyber executive order from failing

Without a trustworthy operating system -- especially for critical infrastructure -- real cybersecurity is scientifically impossible.

innovation (ESB Professional/Shutterstock.com)

Don't forget your dig IT nominations

Help GCN showcase great examples of discovery and innovation in government IT.

wannacry ransomware

‘WannaCry’ ransomware attack raises alarm bells for cities, states

IT officials say they often don’t have enough money to effectively fight sophisticated cyber threats, especially one of this scale.

blockchain (By a-image/Shutterstock.com)

Unlocking blockchain for government

Using blockchain technology through permissioned networks can help state governments improve the delivery of their services, a new report finds.

man working on old PC

Are public sector organizations more at risk from cyberattacks on old computers?

Although agencies struggle with outdated computer systems, governments have significant resources to upgrade them to mitigate cyber threats.

Topic Resources

  • Take Cybersecurity to the Next Level

    A top challenge for every government agency today is the effective management of cybersecurity risks. Protecting government information and citizens’ personal data has become more challenging as our networks and the amount of data on them has grown exponentially. In this Executive Insights, you’ll learn how a risk-based approach leveraging automation can provide a solid foundation to your agency’s cybersecurity posture.