FEMA finds a better approach to systems security

FEMA finds a better approach to systems security

An aggressive push for improved authentication has resulted in savings, standardization and safer data.

Indiana CIO Dewand Neely

Applied analytics: What other states can learn from Indiana's wins (and missteps)

Indiana CIO Dewand Neely discusses his state's data analytics practice and its new approach to workforce cybersecurity training.

4 security management strategies for data center consolidation

4 security management strategies for data center consolidation

Organizational flexibility, encryption and automation will help network administrators better manage security as data centers shrink.

How LA corralled its security data

How LA corralled its security data

Los Angeles’ Integrated Security Operations Center consolidates all departmental cybersecurity into one central system.

18 states tap DHS for voting security help

18 states ask DHS for help securing voting systems

In response to the threat of foreign interference in U.S. elections, 18 states have asked the Department of Homeland Security for advice on how to protect voting technology from cyber tampering.

Can blockchain spark a government services revolution?

The technology that underpins the Bitcoin crytocurrency has the potential to power all sorts of innovative government services.

HIPAA compliance monitoring of USF health system

Disrupting the network for better security and resiliency

The static networks of old aren’t built to address evolving threats. They must be replaced by highly portable and distributed networks that can anticipate the next potential threat.

Is mobile security finally getting some respect?

At DHS, software assurance goes mobile

A Science and Technology Directorate research project proves that reducing the risk of third-party applications is not such a remote possibility.

smart city

Survey: Attacks on smart city IT all but inevitable

A Tripwire study also found that 88 percent of IT professionals think such hacks would pose a threat to public safety.

Saving lives by letting cars talk to each other

When connected cars can be hacked from afar

As the U.S. outlines new rules for driverless car development and safety, Chinese researchers uncover vulnerabilities that can be exploited from 12 miles away.

bug bounty

Bug bounties: How federal agencies can learn from Apple

Apple's exclusive bug bounty program is one that federal agencies -- particularly the most risk-averse -- could embrace.

State computers increasingly under attack by cybercriminals

State computers increasingly under attack by cybercriminals

Although states have strengthened their defenses against hackers and cybercriminals who attack their computer networks, officials admit they’re not fully prepared for increasingly complex threats that could expose the personal information of their residents.

Topic Resources

  • Take Cybersecurity to the Next Level

    A top challenge for every government agency today is the effective management of cybersecurity risks. Protecting government information and citizens’ personal data has become more challenging as our networks and the amount of data on them has grown exponentially. In this Executive Insights, you’ll learn how a risk-based approach leveraging automation can provide a solid foundation to your agency’s cybersecurity posture.

More from 1105 Public Sector Media Group