hands typing on keyboard (By ESB Professional/Shutterstock.com)

Virginia Cyber Range serves up statewide hands-on education

An Amazon Web Services' cloud environment offers scalability and responsiveness to Virginia Tech's higher-ed partners, while minimizing costs.

cell phone encryption (Bakhtiar Zein/Shutterstock.com)

When is 'not a backdoor' just a backdoor? Australia's struggle with encryption

It's worth being skeptical of any mechanism aimed at accessing encrypted messages on platforms like WhatsApp.

identity protection (By Jirsak/Shutterstock.com)

Government’s role in protecting identity in an age of data breaches

We can’t go back to the old model of making people stand in line at government offices, but agencies must protect the identities of individuals requesting benefits and services.

botnet (By BeeBright/Shutterstock.com)

Commerce seeks ideas for battling botnets

The request for comment focuses on "ways to improve industry's ability to reduce threats ... and what role, if any, the U.S. Government should play."

Stalking the insider threat

Protection from insider threats

Privileged account management is critical in keeping agency networks secure.

Cloud solutions can transform network security

Software-defined access control assesses trust of both users and devices and allows access to applications and services based on granular trust-based decisions.

Reimagining the TIC for a cloud environment

As agencies move to adopt cloud services, the Trusted Internet Connections architecture is becoming increasingly problematic.

lock, credit cards, keyboard (279photo Studio/Shutterstock.com)

Shoring up PCI compliance

Agencies that store, process or transmit credit or debit card data must comply with the Payment Card Industry Data Security Standard.

election security

DHS secretary reaffirms support for voting systems’ critical infrastructure designation

Evidence of Russian hacks on the election system has Department of Homeland Security Secretary John Kelly doubling down on his backing of the extra protection.

plumbers fixing leak (Macrovector/Shutterstock.com)

After a data spill: Containing and repairing the damage

Five tips to help agencies minimize the damage of an unintentional data spill.

ransomware (Nicescene/Shutterstock.com)

When it comes to ransomware, it’s sometimes best to pay up

Paying up may be the rational choice for some organizations, but given that cybercriminals go where the money is, the repercussions for others could be significant.

form asking for SSN (Ekaterina_Minaeva/Shutterstock.com)

Social Security numbers: a security risk with serious staying power

Despite the risk of fraud and identity theft posed by the use of Social Security numbers as identifiers, agencies continue to use them.

Topic Resources

  • Take Cybersecurity to the Next Level

    A top challenge for every government agency today is the effective management of cybersecurity risks. Protecting government information and citizens’ personal data has become more challenging as our networks and the amount of data on them has grown exponentially. In this Executive Insights, you’ll learn how a risk-based approach leveraging automation can provide a solid foundation to your agency’s cybersecurity posture.

More from 1105 Public Sector Media Group