Explaining cybersecurity threats in a decision-maker context (ShutterStock image)

Explaining cybersecurity threats in a decision-maker context

Cyber professionals must help decision makers understand the nature, impact and context of vulnerabilities so they understand the available courses of action, their relative costs, impacts and benefits.

Fingerprint biometrics (ShutterStock image)

Making fingerprints more reliable biometrics

The intelligence community's research arm is working on detecting fake fingerprints and developing devices to collect fingerprint data without a human operator.

 (Photo/75th Training Command, Army Reserve Maj. Adam Collett)

Army Reserve pilots management tool for cyber talent

Working with Carnegie Mellon University, the Army Reserve has developed the Cyber Warrior Database, a master repository to track the skills soldiers acquire in their civilian jobs and match them to potential military applications.

Voters (Photo by Gino Santa Maria/ShutterStock)

Voting infrastructure protections need fleshing out

The independent federal commission that helps states improve their voting systems wants more clarity on what DHS' critical infrastructure designation means.

How to secure a smartphone for the tweeter-in-chief

How to secure a smartphone for the tweeter-in-chief

Beyond ensuring overall network security, government cybersecurity specialists have several ways of locking down a smartphone.

Machine learning tool helps county detect cyber risks (Screen image by DarkTrace)

Machine learning tool helps county detect cyber risks

Officials in Livingston County, Mich., turned to a machine learning tool that can find anomalies in user and device behaviors without previous knowledge of what to look for.

Nevada Gov. Brian Sandoval  and Virginia Gov. Terry McAuliffe at the National Governors Association 2017 winter meeting (NGA photo via Twitter)

Governors put cybersecurity, broadband on front burner

At the National Governors Association winter meeting, Govs. Terry McAuliffe and Brian Sandoval both spoke about opportunities for the federal and state governments to work together and across the aisle.

Image courtesy of D-Wave

Cybersecurity firm buys next-gen quantum machine

Temporal Defense Systems plans to use the D-Wave 2000Q to solve complex cybersecurity problems affecting governments and commercial enterprises.

Overcoming ‘cyber-fatigue’ requires users to step up for security (ShutterStock image)

Overcoming ‘cyber-fatigue’ requires users to step up for security

Instead of repeating the same guidelines and recommendations of the past, it’s time to take a new and unconventional look at our approach to technology and how we secure it.

Donald Trump (WhiteHouse.gov photo)

What Trump means for government tech

As a man famously reluctant to use computers, President Donald Trump must lead a government that is ever more reliant on technology for service delivery and national security.

GSA readies single sign-on platform (Photo by ShutterStock)

GSA readies single sign-on platform

The Login.gov shared authentication platform allows individuals with personal accounts to access government services and gives participating agencies the option of using the platform as a shared service.

Filtering false positives (Photo by ra2studio/ShutterStock)

7 ways to filter out cyber alert false positives

As the volume of alerts continues to increase, eliminating false positives and developing new methods of handling them will become increasingly critical.

Topic Resources

  • Take Cybersecurity to the Next Level

    A top challenge for every government agency today is the effective management of cybersecurity risks. Protecting government information and citizens’ personal data has become more challenging as our networks and the amount of data on them has grown exponentially. In this Executive Insights, you’ll learn how a risk-based approach leveraging automation can provide a solid foundation to your agency’s cybersecurity posture.

More from 1105 Public Sector Media Group