common access cards

On the hunt for a CAC replacement

Defense officials are making headway on identity management tools that can eventually replace the Common Access Card.

Identity search engine compares biometrics to watch lists

Identity protection is an overdue government mission

Governments across America now need a more robust approach to provide secure digital identities for their own operations and for the citizens they serve.

careless user error

Survey: Careless errors still pose biggest threat to agency networks

Careless or untrained insiders pose more security risks to federal agencies than threats from foreign governments, malicious insiders or terrorists, according to a new survey.

passwords (image by

Using truly secure passwords: 6 essential reads

From password managers, to biometrics to emoji- or gesture-based passwords, researchers are working on ways to make it easier to secure information.

woman with connected laptop and phone (SFIO CRACHO/

On the verge of true federal IT modernization

By embracing cloud, biometrics and mobility, agencies can deliver the types of services citizens have come to expect from the private sector.

government cloud

When to purchase cloud security services

Using Gartner's cloud security hype cycle, agencies can determine when technologies are mature and stable enough for government use.

mobile security (Nata-Lia/

DHS invests in mobile app security

The Department of Homeland Security's Science & Technology Directorate is funding research to secure the entire app development lifecycle.

open lock (ESB Professional/

DHS orders Kaspersky software removed from agency systems

Citing the potential that the Russian company's products could be used by "malicious cyber actors" to gain access to federal IT systems, the Department of Homeland Security directed agencies to stop using software.

IoT security

NTIA drafts best practices for patching IoT

Working groups are crafting guidance for mitigating security vulnerabilities in internet-of-things devices and applications.

global ransomware attack

Ransomware defense depends on product upgrades, patches

Intelligence officials encouraged IT managers to patch software and retire products at the end of their lifecycles.

phishing (DesignPrax/

DARPA enlists bots to fight social engineering

DARPA wants to take the onus for detecting phishing schemes off the employee by using bots to detect and identify the sources of social engineering campaigns.

line in airport (06photo/

CBP plans 2018 facial recognition rollout

Customs and Border Protection aims to use facial recognition tech at the top 20 U.S. airports by February 2018, according to a senior agency official.

Topic Resources

  • Take Cybersecurity to the Next Level

    A top challenge for every government agency today is the effective management of cybersecurity risks. Protecting government information and citizens’ personal data has become more challenging as our networks and the amount of data on them has grown exponentially. In this Executive Insights, you’ll learn how a risk-based approach leveraging automation can provide a solid foundation to your agency’s cybersecurity posture.

More from 1105 Public Sector Media Group