light in framework tunnel (Roman Sakhno/Shutterstock.com)

The Cybersecurity Framework is helping agencies, but there's room for improvement

IT managers have gotten better at preventing attacks, but they must ensure they can also quickly respond and recover.

fake news (igorstevanovic/Shutterstock.com)

Can Russian cyber meddling be stopped?

The low-cost electronic meddling that sows suspicion in the democratic process is likely to continue, a cybersecurity expect told a Senate panel.

pointing at code (Dmitry A/Shutterstock.com)

ONR seeks to speed development of cryptographic software

Galois is creating a suite of tools that will improve the development and testing of new cryptographic algorithms.

backdoor (BeeBright/Shuterstock.com)

When is a back door not a back door?

FBI Director Christopher Wray's call for a solution to uncrackable encryption sounds curiously like a request for a back door.

Karen Jackson (Virginia Secretary of Technology)

Karen Jackson: The exit interview

Virginia's outgoing secretary of technology talks about her work in cybersecurity, autonomous technology and smart communities.

America’s aging voting machines managed to survive another election

Elections: Another unsecured enterprise application?

With IT systems underpinning elections infrastructure, state officials are taking different approaches to secure their systems against growing threats.

lioness on the hunt (Stephanie Periquet/Shutterstock.com)

How threat hunting enhances cybersecurity

Proactive hunting can find core security issues much faster than traditional reactive methods and reduce workload on security analysts who must focus on fighting day-to-day fires.

robot typing (maxuser/Shutterstock.com)

AI cybersecurity: Let's take some deep breaths

Automated attack response protocols give agencies a solid base for preventing current and future artificial intelligence-enabled cyberattacks.

Bipartisan Senate bill would help states beef up election cybersecurity

The new proposal would help streamline cybersecurity info-sharing between federal and state officials, authorize grants to replace outdated equipment and develop election cybersecurity guidelines.

waiting in line

States could wait 9 months for DHS election system assessments

States are being given priority for the risk and vulnerability assessments that provide an in-depth, on-site review of internal and external networks.

dark clouds above government building

Top cyber risks for 2018

As 2018 begins, a top risk consulting firm reflects on how the cyber landscape has transformed over the last year.

blockchain (NicoElNino/Shutterstock.com)

Blockchain in government: Are we ready for prime time?

It's possible that enthusiasm for the technology may be outpacing its practicality.

Topic Resources

  • Security in the Cloud: Moving Beyond Compliance

    Creating a fully compliant cloud-based system is hard enough, but even that doesn’t go far enough to ensure security. As federal agencies are migrating to the cloud, some are learning best methods for creating a cloud-based security model they can trust...

  • IT Consolidation: What's Next for Government Modernization Initiatives?

    IT consolidation has been a high-priority federal initiative for years. While the value is clear, it’s critical for federal IT pros to understand a key piece of the equation: to realize the full value, agencies must also consolidate their ITOM tools.

  • Case Study: City of Fayetteville

    What if you could find out what animals needed attention at the animal shelter, which sporting equipment was used most frequently in the city gym, which parking garage spaces were available most often, and when traffic was the busiest around city hall — all in a matter of minutes, from anywhere? Although this may sound futuristic, government organizations, like the city of Fayetteville, are already using technology to solve for these questions, and much more.

  • With Help From GSA, Agencies Get IT Fit

    The universe of IT tools developed to help government agencies achieve their missions is rapidly expanding. So, too, the means for acquiring them. GSA has moved to streamline acquisition of IT tools and services that combat cyberhackers, migrate operations to the cloud and use professional-services providers, to name a few.

  • PixelNet 2.0: The Pixel Perfect Platform

    On a large corporate campus for a major hardware manufacturer, the ability to display and manage audiovisual data is paramount. From real-time operations room video and security camera footage, to lobby signage, to streaming data and other A/V applications in conference rooms across multiple buildings, critical operations rely on accurate, real-time video data.


More from 1105 Public Sector Media Group