Federal 100 logo

Federal 100 winners announced

The winners went above and beyond their job descriptions, making contributions in buying, managing and using technology that had a positive impact on government IT.

email security

Raising the red flag on recent DMARC hype

DMARC as only a small piece of a much larger email security strategy that must include real-time mailbox-level inspections that analyze both communication habits and sender indicators.

smart city security (By Shaynepplstockphoto/Shutterstock.com)

Collaborating for better smart cities

At the Global City Teams Challenge, government leaders will discuss how security and privacy can be addressed in smart city technology.

secure tax filing

As filing season and tax-law changes loom, the IRS stresses identity security

The IRS wants to help individuals securely access their tax data and simplify interactions with states and the tax preparation industry.

identity (ktsdesign/Shutterstock.com)

NIST's digital identity deadline approaches

Federal agencies have just five months to get their legacy systems in compliance with National Institute of Standards and Technology's digital identity guidelines.

facial recognition tech (Artem Oleshko/Shutterstock.com)

TSA explores facial recognition at LAX

The Transportation Security Administration is testing facial recognition technology that compares almost real-time images of passengers' faces with the images on their electronic passports.

voting (Alexandru Nika/Shutterstock.com)

States get policy help in securing the 2018 vote

Federal execs say they want to make election advertising more transparent, upgrade equipment and help strengthen network security.

Strava heat map (Strava)

Strava map shows the tradeoffs of geo-tracking

As location-based data becomes increasingly important to smart cities, the security and privacy concerns must be addressed.

cybersecurity orchestration and automation

Addressing cyber gaps with automation and orchestration

DHS and Marine Corps officials look to automation and orchestration to patch gaps in their cybersecurity strategies.

mobile user texting

Alabama launches authentication app to stop tax refund fraud

By using the app, residents can ensure their tax returns aren't sent to someone who has stolen their identity.

smartphone and city (ponsulak/Shutterstock.com)

Digital services, cyber, cloud priorities for state execs

Although state IT officials expect cloud and digital services adoption to grow, cybersecurity remains their top priority.

data privacy (HQuality/Shutterstock.com)

Census wants help evaluating its privacy-preserving software

The Census Bureau is looking for help auditing software that preserves the privacy of the data it will collect and analyze in the 2020 population count.

Topic Resources

  • Security in the Cloud: Moving Beyond Compliance

    Creating a fully compliant cloud-based system is hard enough, but even that doesn’t go far enough to ensure security. As federal agencies are migrating to the cloud, some are learning best methods for creating a cloud-based security model they can trust...

  • Case Study: City of Fayetteville

    What if you could find out what animals needed attention at the animal shelter, which sporting equipment was used most frequently in the city gym, which parking garage spaces were available most often, and when traffic was the busiest around city hall — all in a matter of minutes, from anywhere? Although this may sound futuristic, government organizations, like the city of Fayetteville, are already using technology to solve for these questions, and much more.

  • PixelNet 2.0: The Pixel Perfect Platform

    On a large corporate campus for a major hardware manufacturer, the ability to display and manage audiovisual data is paramount. From real-time operations room video and security camera footage, to lobby signage, to streaming data and other A/V applications in conference rooms across multiple buildings, critical operations rely on accurate, real-time video data.

  • Accelerate and Maintain NIST 800-171 Compliance

    The Department of Defense (DoD) requires all contractors that process, store or transmit Controlled Unclassified Information (CUI) to have met the Defense Federal Acquisition Regulation Supplement (DFARS) minimum security standards by December 31, 2017 or risk losing their DoD contracts.3

  • Easing the Burden of Compliance

    Achieving and maintaining compliance continues to be a top priority for state and local governments. This is especially true when it comes to cybersecurity-related mandates. The processes for ensuring compliance remain a significant challenge because of new and evolving regulations and requirements. Agencies also struggle with reduced staff and budgets to ensure compliance. This eBook examines the current compliance landscape and how technologies like data encryption can help.


More from 1105 Public Sector Media Group