people voting

How are manufacturers securing their voting machines?

Sen. Ron Wyden (D-Ore.) recently asked five of the country's top voting machine manufacturers what steps they have taken to protect their machines from cyber threats.

cybersecure new york city

NYC looks to improve cybersecurity, broadband

New York City is looking for partners on its new plan to make the city a global capital for all things cybersecurity.

How New Jersey fills the cyber info gap

The New Jersey Cybersecurity & Communications Integration Cell gives small and medium-sizes businesses a conduit to federal cyber resources.

biomonitoring

What makes hackers tick?

For a new study, ethical hackers will wear monitors that measure their biological responses as they attack computers in a network simulation.

Aging voting machines cost local, state governments

Are voting machine hacks overblown?

Breaking into voting machines and altering vote counts is a good deal more difficult than recent election-hacking headlines suggest.

blockchain (Aleutie/Shutterstock.com)

How government can get the most out of blockchain

By starting small, and focusing on user experience and agile development, agencies can take advantage of the new foundational technology.

cybersecurity (Nata-Lia/Shutterstock.com)

Worried about hackers, states turn to cyber insurance

As the threat from hackers and cybercriminals intensifies, a growing number of states are buying cyber insurance to protect themselves -- and taxpayers.

talking about cloud security

Who's really responsible for cloud security?

Understanding the division of security responsibilities between the agency and cloud service providers makes it easier for CIOs to safely move their data to the cloud.

barcoded human (Shutterstock.com)

The challenge of authenticating real humans in a digital world

While cameras, sensors and other devices can make authentication easier for people to accomplish, they carry their own weaknesses.

iphone password screen (Shutterstock.com)

Another mass shooting, another locked phone

Federal investigators want access to the Texas shooter's locked phone, but most security researcher think it’s a bad idea.

facial recognition (Shutterstock.com)

Facial recognition improving 'at breakneck speeds'

Recent winners of the IARPA challenge demonstrate improvements with the technology's accuracy and speed.

blockchain in government

Blockchain: Getting government beyond the hype

Interest in blockchain's public sector potential is growing. But while use cases and proof of concepts are hinting as what's possible, agencies have a ways to go before projects can be rolled out on a larger scale.

Topic Resources

  • Security in the Cloud: Moving Beyond Compliance

    Creating a fully compliant cloud-based system is hard enough, but even that doesn’t go far enough to ensure security. As federal agencies are migrating to the cloud, some are learning best methods for creating a cloud-based security model they can trust...

  • Easing the Burden of Compliance

    Achieving and maintaining compliance continues to be a top priority for state and local governments. This is especially true when it comes to cybersecurity-related mandates. The processes for ensuring compliance remain a significant challenge because of new and evolving regulations and requirements. Agencies also struggle with reduced staff and budgets to ensure compliance. This eBook examines the current compliance landscape and how technologies like data encryption can help.

  • Using Software as a Service For Innovative Government

    As state and local government agencies continue their efforts to modernize and update their IT infrastructure to streamline operations, reduce costs, and deliver better citizen services, many are finding the Software as a Service (SaaS) model to be effective. Moving to a SaaS platform reduces the management burden on IT, improves access and scalability, reduces cost, and can actually increase security.


More from 1105 Public Sector Media Group