Modernization projects, human error top IT security concerns

Modernization projects, human error top IT security concerns

A survey of federal IT managers shows the biggest cybersecurity challenges agencies face.

The tech that locks down ID cards

The tech that locks down ID cards

Whether the card allows for access into a government building or another country, new technologies are making it easier for officials to verify identities.

cyber microscope

Building a better (computer) brain for spotting cyberthreats

Lewis Rhodes Labs has a neuromorphic processor that increases the speed and resolution of anomaly detection by more than 100-fold

cybersecurity in navy budget request

Navy budgets for cyber resiliency

According to recent budget documents, the Navy is asking for $88 million in research and development associated with cyber resiliency.

DARPA looks to measure privacy protection

DARPA looks to measure privacy protection

The research agency underwrites a project to help document a system's effectiveness at protecting user data.

Governments lost 307 million records to breaches in 2015

Governments lost 307 million records to breaches in 2015

A new study finds that public sector organizations in the United States are targets in a vast majority of attacks.

'MouseJack' turns wireless mice, keyboards into liabilities

Peripherals that use unencrypted radio signals to communicate can create vulnerabilities for enterprises.

DOD looks to redefine roles for IT workforce

DOD looks to redefine roles for IT workforce

According to DOD Deputy CIO Richard Hale, the department is seeking to weave cybersecurity duties into virtually every job description.

Lessons learned in business continuity planning

Lessons learned in business continuity planning

Overlooking or underestimating issues in business continuity planning can add insult to injury when disaster finally occurs.

Mobile management software could have unlocked shooter

Mobile management software could have unlocked shooter's iPhone

If the county-owned phone used by San Bernadino shooter Syed Farook had been enrolled in the agency’s mobile device management program, the FBI-Apple standoff might have been moot.

Mitigate cyber breach losses by containing the cell

Mitigate cyber breach losses by containing the cell

While most cybersecurity strategies primarily address limiting the possibility of attack, organizations must assume their systems will be compromised and deploy a strategy to isolate and collapse affected network cells.

Navy finalizes cyber standards for industry

Navy finalizes cyber standards for industry

To ensure its IT systems can successfully operate in a contested cyber environment, the Navy has finalized eight cybersecurity standards that aim to provide a uniform security architecture.

Topic Resources


More from 1105 Public Sector Media Group