drone over solar panels (Peteri/Shutterstock.com)

Memo charges Chinese-made drones with snooping

A memo from Immigrations and Customs Enforcement's investigative arm claims small DJI drones were most likely downloading sensitive data they gathered in the U.S. to the Chinese government's cloud.

woman working at computer (Gorodenkoff/Shutterstock.com)

Cybersecurity quest sends states to vets, students and women

States are trying to beef up their cybersecurity ranks with internships for veterans, cyber classes for students and mentoring programs for girls.

man with passport and phone (Shutterstock.com)

Extreme digital vetting of visitors to the U.S. moves forward under a new name

Immigration and Customs Enforcement officials have invited tech companies to develop algorithms that will track visa holders' social media activity.

business meeting (YanLev/Shutterstock.com)

MITRE's ATT&CK finds a home in the cybersecurity community

The threat matrix is being leveraged by organizations and incorporated into security products.

hacker at work (Alexander Geiger/Shutterstock.com)

Limiting the insider threat

Solutions that blend technology and process can help agencies improve their defenses against insider threats.

exec with laptop and phone (ImYanis/Shutterstock.com)

Cybersecurity lessons from the campaign trail

A new report offering solid technical advice for political campaigns can be useful to smaller government offices working to secure information.

software development (Legend_art/Shutterstock.com)

Stopping a cybersecurity disaster at the software development level

Developers need a frictionless approach for inserting code analysis into the software development lifecycle that provides continuous visibility and protection when pushing out new code or updates.

website security (Zeeker2526/Shutterstock.com)

Don't leave your front door open to attack

Agencies must ensure their website security can counter today's quickly evolving cyber threats so hackers don't get easy access to internal systems.

secure cloud

AWS aims to put classified data in the cloud

Amazon Web Services' new AWS Secret Region will be available to the intelligence community and other federal agencies.

people voting

How are manufacturers securing their voting machines?

Sen. Ron Wyden (D-Ore.) recently asked five of the country's top voting machine manufacturers what steps they have taken to protect their machines from cyber threats.

cybersecure new york city

NYC looks to improve cybersecurity, broadband

New York City is looking for partners on its new plan to make the city a global capital for all things cybersecurity.

How New Jersey fills the cyber info gap

The New Jersey Cybersecurity & Communications Integration Cell gives small and medium-sizes businesses a conduit to federal cyber resources.

Topic Resources

  • Security in the Cloud: Moving Beyond Compliance

    Creating a fully compliant cloud-based system is hard enough, but even that doesn’t go far enough to ensure security. As federal agencies are migrating to the cloud, some are learning best methods for creating a cloud-based security model they can trust...

  • Easing the Burden of Compliance

    Achieving and maintaining compliance continues to be a top priority for state and local governments. This is especially true when it comes to cybersecurity-related mandates. The processes for ensuring compliance remain a significant challenge because of new and evolving regulations and requirements. Agencies also struggle with reduced staff and budgets to ensure compliance. This eBook examines the current compliance landscape and how technologies like data encryption can help.

  • Using Software as a Service For Innovative Government

    As state and local government agencies continue their efforts to modernize and update their IT infrastructure to streamline operations, reduce costs, and deliver better citizen services, many are finding the Software as a Service (SaaS) model to be effective. Moving to a SaaS platform reduces the management burden on IT, improves access and scalability, reduces cost, and can actually increase security.

More from 1105 Public Sector Media Group