Asking DHS to hack your systems

Asking DHS to hack your systems

The Department of Homeland Security's National Cybersecurity Assessment and Technical Services can help governments at all levels learn how their networks look to would-be attackers.

Ransomware on SLED networks

Malware, ransomware twice as likely to hit state, local networks

After evaluating over 30 million alerts from its users around the world, Sentinel IPS found that 67 percent of government networks and 72 percent of education networks triggered critical malware or ransomware alerts.

mobile device management

The future of mobile data management

Just managing the device is no longer an option. Here's where the experts see mobile-security strategies heading in 2016 and beyond.

Dell ships laptops with certificate vulnerabilities

Dell ships laptops with certificate vulnerabilities

The company has released a patch that fixes the flaws that could give hackers access to private information.

How SDN builds next-gen security

How SDN builds next-gen security

A shift towards software-defined security can deliver improvements in automation, virtualization and a holistic security architecture.

smartphone access to IoT in home

Making mobile phones the authentication hubs for smart homes

With funding from the National Strategy for Trusted Identities in Cyberspace, the pilots address barriers to the identity ecosystem and seed the marketplace with “NSTIC-aligned” solutions to enhance privacy, security and convenience in online transactions.

5 ways the U.S. government can get security right

5 ways the U.S. government can get security right

Although recent data breaches may indicate that computer security is harder than putting a man on the moon, the government can improve its cyber posture.

Are legacy apps a ticking time bomb?

Are legacy apps a ticking time bomb?

Recent surveys of government IT managers show increasing hand wringing when it comes to legacy systems.

Government IT and the problems that matter

Government IT and the problems that matter

Identifying and dealing with potential issues before they become problematic should be the primary goal of every agency’s IT team.

9 ways to use web proxies to limit Internet exposure

9 ways to use web proxies to limit Internet exposure

The Internet is a dangerous place. But there are concrete steps an organization can take to manage the risk while still allowing employees the access they need.

How states stack up on cyber readiness

How states stack up on cyber readiness

The Pell Center’s report on the cyber readiness of eight states explores how states are protecting infrastructure, information and operations.

Building the 21st century vault with layered security

Building the 21st century vault with layered security

No matter where information is located -- on the network or a personal computer -- multiple layers of security must be in place to keep threats at bay.


More from 1105 Public Sector Media Group