Competition pits college students against hackers

Competition pits college students against hackers

Cybersecurity students from eight universities will compete to defend a mock financial institution from attack.

How blockchain works

How blockchain works

A blockchain-based system marries ironclad trust to a fully auditable sequence of digital events enclosed in a highly secure environment.

Put your trust in knowing untrusted certificate authorities

Put your trust in knowing untrusted certificate authorities

Google has started to maintain a list of untrusted certificate authorities, which it’s calling Submariner.

University of Colorado, Colorado Springs

Colorado looks to flatten cyber learning curve for elected officials

The state’s National Cybersecurity Intelligence Center aims to be the country’s foremost authority on cybersecurity education, research and rapid response.

API security

How to secure the API-enabled enterprise

Despite their ubiquity and unquestioned business value, application programming interfaces are often overlooked and underprotected.

voting technology

Tech tiptoes into the voting process

Election officials in Ohio and Utah will see how technology improves the reporting of results and the caucus voting process.

block chain on the horizon for government

Blockchain on the government horizon

The technology that powers Bitcoin has the potential to address government trust and security issues.

Open redirects persist on government sites

Open redirects persist on government sites

Spammers are taking advantage of misconfigured dot-gov domains and link shorteners to redirect visitors to other sites.

NIST updates telework security guidance

NIST updates telework security guidance

The National Institute of Standards and Technology is revising its 2009 telework guides to cover the booming use of employee, contractor and vendor devices to access agency resources.

Toolkit boosts Army network visibility, cybersecurity compliance

Toolkit boosts Army network visibility, cybersecurity compliance

With the new Assured Compliance Assessment Solution Reporting Toolkit, the Army is automating cybersecurity management.

Endgame cybersecurity platform

Endgame tracks down adversaries in AF Red Flag exercise

The Endgame cybersecurity platform has helped both red and blue teams hunting and securing networks at the Air Force’s Red Flag exercise.

The newest cyber risk: Hackers can hear what you

The newest cyber risk: Hackers can hear what you're printing

Using only a smartphone, researchers were able to get enough information from signals created by a 3-D printer’s nozzle to reverse-engineer the object being manufactured.

Topic Resources


More from 1105 Public Sector Media Group