security meter on excellent

Better prep for cyberattacks

A robust threat management strategy ensures the overall health and security of the environment and mitigates threats posed by employees, hostile actors and organized large-scale attacks.

ransomware (Bakhtiar Zein/

Ransomware protection for backup data

BackupAssist is adding ransomware protection to its suite of data recovery tools.

AI enabled security (Tatiana Shepeleva/

Artificial intelligence cyberattacks are coming -- but what does that mean?

Adding AI to today's cybercrime and cybersecurity world will fuel what is already a rapidly escalating arms race between attackers and defenders.

hidden cobra botnet

US-CERT details North Korean bot

The alert from the U.S. Computer Emergency Readiness Team explains how network defenders can detect and mitigate the Hidden Cobra DDOS botnet.

login as root

Weave your cybersecurity tactics into a cohesive strategy

By protecting the credentials used to spread an attack, IT managers can mitigate damage after an initial breach.

quantum computing (Brookhaven National Lab)

How quantum mechanics can change computing

Although large-scale quantum computers do not yet exist, they may hold the key to the future of internet security.

risk management

How agencies can comply with the cyber executive order

The risk-management approach requires agencies to have a clear and detailed understanding of their IT environment.

community meeting (

Communities forming around blockchain for government

The Government Blockchain Association and DC Blockchain Center are bringing public- and private-sector officials together to leverage the technology in the government space.

facial recognition for drivers license

NY's facial recognition program continues to nab fraudsters

To date, the technology has flagged more than 21,000 cases of possible identity fraud.

USS John S. McCain (Navy photo by Petty Officer 3rd Class James Vazquez)

Cyber suspicions floated after latest ship collision

The Navy says there is no sign of cyber intrusion, but "all possibilities" will be investigated.

smart grid rolling out (DarwelShots/

NIST tackles smart grid framework update

The entire energy ecosystem has shifted since the National Institute of Standards and Technology last updated its guidelines for smart grid interoperability.

hacker (Dmitry Tishchenko/

Tracing the sources of today's Russian cyber threat

Some of the most talented and dangerous cyber warriors and criminals come from Russia, a long-time meddler in other nations' digital systems.

Topic Resources

  • Take Cybersecurity to the Next Level

    A top challenge for every government agency today is the effective management of cybersecurity risks. Protecting government information and citizens’ personal data has become more challenging as our networks and the amount of data on them has grown exponentially. In this Executive Insights, you’ll learn how a risk-based approach leveraging automation can provide a solid foundation to your agency’s cybersecurity posture.

More from 1105 Public Sector Media Group