Rhode Island releases state cybersecurity plan

The Rhode Island Cybersecurity Commission evaluated the state's cybersecurity infrastructure and made recommendations to enhance the resiliency of operations in executive branch agencies.

security of open source software

Why open source is a safe choice for agencies

Open source technologies combine distributed peer review and transparency, which speeds innovation and lowers costs.

Cyber, mobile and managed services:  What state CIOs are saying

Cyber, mobile and managed services: What state CIOs are saying

NASCIO's latest poll of state CIOs explores a wide range of IT problems and priorities.

Securing the smart city

Securing the smart city

State and local governments are balancing privacy, security and citizen service as the amount of available data explodes -- and finding that policy needs to catch up with the tech.

The USPS is struggling with phishing attacks

USPS staff take the bait in phishing test

U.S. Postal Service's Office of the Inspector General sent phishing emails of its own to 3,125 USPS employees, to see if staff would click on a potentially dangerous link.

Secure file transfer: The cornerstone of digital government

Secure file transfer: The cornerstone of digital government

With encrypted file transfer, city departments can quickly and efficiently process requests involving sensitive information.

GCN Government Executive of the Year: Ron Ross

Government Executive of the Year: Ron Ross

If the discussion involves information security, NIST’s technology fellow is almost certainly shaping it.

Cyber defense front and center at NIE

Cyber defense front and center at NIE

Officials described the increased focus on cybersecurity and cyber defense at the semi-annual Network Integration Evaluation.

Is STARTTLS enough for email security?

Is STARTTLS enough for email security?

STARTTLS, a common method for encrypting email in transit, does not protect against other major security concerns and is not the only option within the federal government.

Build public trust by tightening security preparedness

Build public trust by tightening security preparedness

By addressing issues of data governance and social responsibility, agencies can rebuild the public trust lost in recent security breaches.

Terrorism info-sharing network gets health check

Terrorism info-sharing network gets health check

The state of the nation’s Information Sharing Environment is ‘strong,’ says ISE program manager.

research into behavior based mobile security

DHS funds behavior-based tech to enhance mobile security

Northrop Grumman will leverage university research to develop more secure methods for authenticating users while eliminating the need for passwords.

Topic Resources