tax form (RomanR/Shutterstock.com)

Tax scam: A game of speed and numbers

The IRS might be outgunned in the fight against tax fraud.

communication across the power grid (chombosan/Shutterstock.com)

Getting power to the grid after a cyber attack

DARPA is building a secure network that aims to operate without power or internet connectivity across disparate IT networks and grid infrastructure technologies.

machine to machine communications

Cyber threat info sharing made easier

A more effective machine-to-machine threat information sharing language and platform should speed adoption across industry.

man walking with smartphone

Behavior-based mobile authentication ‘on the horizon’

Technology that monitors how users interact with their devices has been demonstrated by various performers, a DHS cyber expert says.

network security (deepadesigns/Shutterstock.com)

A blueprint for the modern government security operations center

By leveraging automation and analysis tools, government security operations centers can effectively face the new landscape of cyber threats.

phishing attack (wk1003mike/Shutterstock.com)

Business email compromise: Don’t catch that phish!

Safeguarding an agency against email compromise involves both administrative awareness and technical controls, such as email rules, filtering and third-party solutions.

secure supply chain

Insiders in the supply chain

An insecure IT supply chain can present as much risk to agencies as an insider exfiltrating data, according to security experts.

spyware

How Pegasus for Android was unmasked

Even with security researchers looking for an Android variant of the iOS spyware, the sophisticated program designed to surveil specific targets managed to hide itself.

data sharing (Vector Tradition SM/Shutterstock.com)

Why threat-data sharing is so hard

Agencies’ different interests in threat tracking, mitigation and prosecution can make it difficult for them to share information related to cyber attacks.

cyber health

Is it time for a U.S. (cyber) health service?

IT managers can improve data security by taking a page from how the health care community prevents, tracks down and resolves public health problems.

government cybersecurity (Bakhtiar Zein/Shutterstock.com)

Looking to the feds for help in fighting cybercriminals

The proposed State Cyber Resiliency Act would create a dedicated grant program to help states protect themselves against cybersecurity threats and better identify, detect, respond to and recover from attacks.

adversarial machine learning

Machines learning evolves, and hackers stand to gain

Automated systems that teach themselves can be manipulated by adversaries.

Topic Resources

  • Take Cybersecurity to the Next Level

    A top challenge for every government agency today is the effective management of cybersecurity risks. Protecting government information and citizens’ personal data has become more challenging as our networks and the amount of data on them has grown exponentially. In this Executive Insights, you’ll learn how a risk-based approach leveraging automation can provide a solid foundation to your agency’s cybersecurity posture.


More from 1105 Public Sector Media Group