Mitigate cyber breach losses by containing the cell

Mitigate cyber breach losses by containing the cell

While most cybersecurity strategies primarily address limiting the possibility of attack, organizations must assume their systems will be compromised and deploy a strategy to isolate and collapse affected network cells.

Navy finalizes cyber standards for industry

Navy finalizes cyber standards for industry

To ensure its IT systems can successfully operate in a contested cyber environment, the Navy has finalized eight cybersecurity standards that aim to provide a uniform security architecture.

states are battling bogus requests for refunds

It’s tax season, and states are battling bogus requests for refunds

States are working to try to stop online filing fraud by verifying the identity of the filers, strengthening password protocols and sharing information on filings that use stolen identities.

Identity search engine compares biometrics to watch lists

Identity search engine compares biometrics to watch lists

MorphoTrust’s automated biometric identification system helps warfighters on the ground verify identities with a search engine that registers and compares biometric features against data on file.

workflow resilience

Feds look to secure common workflows

U.S. CIO Tony Scott said securing shared networks and applications will help maintain network resiliency.

GSA steps up cybersecurity in for NS2020 environment

GSA steps up cybersecurity for NS2020 environment

The General Services Administration is weaving cybersecurity into the fabric of its next-generation telecommunications contract.

5 principles to ensure CNAP success

The Cybersecurity National Action Plan has potential -- but now we must encourage mass-scale commitment.

Bill seeks to prevent patchwork of state encryption rules

Bill seeks to prevent patchwork of state encryption rules

A new bill would preempt states from making their own laws regarding access to encrypted communications.

SCILock hard disk

SCILock protects against persistent malware

CRU’s SCILock Secure Drive protects operating systems and other software from unauthorized changes, preventing malware from taking hold and becoming persistent.

healthcare data security

NJ takes on cyber threats to health care

The New Jersey Cybersecurity and Communications Integration Cell is working to enhance threat information sharing among health care providers.

How local government can manage technology risk

How local government can manage technology risk

A recent report outlines how local governments can manage common types of technology-related risks.

Road to driverless vehicles paved with risk

Road to driverless vehicles paved with risk

Questions on safety standards and cybersecurity still need to be answered before connected and autonomous vehicles make their way onto the nations roadways.


More from 1105 Public Sector Media Group