chipped key

The age of hacking brings a return to the physical key

Combining a password management program with a chipped Universal Second Factor key can create very strong passwords that users don’t need to memorize.

cloud security (

NGA looks to ‘reinvent security’ with fast-churn cloud architecture

The National Geospatial-Intelligence Agency wants the flexibility to tear down its cloud architecture and rebuild it every day so that would-be attackers confront a confusing operating environment.

facial recognition (Montri Nipitvittaya/

House seeks clarity on FBI facial recognition database

Members of the House Committee on Oversight and Government Reform questioned the FBI over its use of facial recognition technology.

cloud-based security (Omelchenko/

7 reasons why cloud-based security makes sense

Moving the point of mitigation from the data center to the cloud platform offloads the responsibility from an agency’s IT staff to that of the cloud provider and offers several other advantages.

blockchain as a service

IBM launches blockchain as a service

Based on the IBM Cloud, the new service gives enterprises a way to experiment with the distributed ledger technology.

blockchain in healthcare

The new building block(chain) of health care records management

A scalable, secure data exchange ecosystem can support high-quality research while safeguarding against breaches of sensitive patient data.

digital planet (ShutterStock image)

Cyber nationalism and the new world order

More transparency, better law enforcement and a more robust engagement among the cyber superpowers can mitigate against the worst cybersecurity risks and reduce the influence of catalytic actors.

Election systems security under increasing scrutiny

Local elections officials are struggling with maintaining and protecting their election systems, despite offers of help from the Department of Homeland Security.

chess game wireframe (Shutterstock image)

Questions persist for national cyber strategy

Fundamental issues relating to domestic and foreign cybersecurity threats were discussed by experts at the recent RSA Conference.

document security (ShutterStock image)

5 ways to strengthen internal document management

Agencies that can streamline and secure their internal document management processes are better able to protect their assets.

cybersecurity threats (ShutterStock image)

Managing both acute and chronic web application security issues

Immediate actions will help agencies protect the health of their systems, but they must also address their long-term vulnerabilities.

social media scanning (ShutterStock image)

Social media screening pilots lack metrics, DHS IG says

Without measurement criteria, the pilots will be of limited use in planning and implementing a social media screening program, the agency watchdog says.

Topic Resources

  • Take Cybersecurity to the Next Level

    A top challenge for every government agency today is the effective management of cybersecurity risks. Protecting government information and citizens’ personal data has become more challenging as our networks and the amount of data on them has grown exponentially. In this Executive Insights, you’ll learn how a risk-based approach leveraging automation can provide a solid foundation to your agency’s cybersecurity posture.

More from 1105 Public Sector Media Group