5 ways to avoid compromised database credentials

5 ways to avoid compromised database credentials

Agencies can identify and protect databases from bad actors attempting to use stolen database credentials to appear as legitimate insiders.

Tools to track stolen data through the dark web

Tools to track stolen data through the dark web

Although the information that is lifted from government or corporate networks by criminals is a hot commodity on the dark web, tools are being developed to help officials track their stolen data.

Network defense must improve as hacking profession matures

Network defense must improve as hacking profession matures

Knowing more about organized cybercriminals and the malware marketplace can help IT managers better defend the enterprise, Kaspersky Lab says.

Mandatory password changes -- not as secure as you think

Mandatory password changes -- not as secure as you think

Frequent, mandatory password changes are not only unnecessary but may in fact be harmful to security, according to studies on the subject.

Hunting in-network attackers requires a different approach to security

Hunting in-network attackers requires a different approach to security

Instead of looking for the technical attributes of known malware and other exploits, IT managers can quickly and accurately detect active attackers by the things they must do on an unfamiliar network to accomplish their objective.

6 steps to meet the deadline for payment card security

6 steps to meet the deadline for payment card security

Migrating to the stronger encryption now will ensure agencies that process credit card payments can continue to conduct business, serve taxpayers and bring in revenue.

debate over cybersecurity

Hayden: Political culture limits government’s ability to protect IT systems

Gen. Michael Hayden, the former director of the National Security Agency and CIA, said the nation has hardly begun the cybersecurity conversation about what should be open and what should be protected.

Can biometrics be used to provide better citizen services?

Can authentication deliver better citizen services?

Security credentials could be based on a primary payment card, a mobile phone or a driver's license -- items users are unlikely to lose or misplace.

mobile authentication

Mobile devices: A better route to ID security

Advances in biometric authentication and smartphone technologies make the marriage of the two a strong platform for identity verification.

The 2016 GCN dig IT Awards: Make your nominations today!

The 2016 GCN dig IT Awards: Make your nominations today!

Celebrating discovery and innovation in government IT.

dangers of electromagnetic pulses to the electric grid

Is government prepared for the pulse?

Legislators are looking at how government can prepare for and respond to an electromagnetic pulse attack on the U.S. electrical grid.

Agencies struggle under burden of legacy IT

Agencies struggle under burden of legacy IT

As experts warn of the threats posed by outdated federal technology, lawmakers inch closer to backing a $3.1 billion fix-it fund.

Topic Resources


More from 1105 Public Sector Media Group