woman working at computer (Gorodenkoff/Shutterstock.com)

Cybersecurity quest sends states to vets, students and women

States are trying to beef up their cybersecurity ranks with internships for veterans, cyber classes for students and mentoring programs for girls.

man with passport and phone (Shutterstock.com)

Extreme digital vetting of visitors to the U.S. moves forward under a new name

Immigration and Customs Enforcement officials have invited tech companies to develop algorithms that will track visa holders' social media activity.

business meeting (YanLev/Shutterstock.com)

MITRE's ATT&CK finds a home in the cybersecurity community

The threat matrix is being leveraged by organizations and incorporated into security products.

hacker at work (Alexander Geiger/Shutterstock.com)

Limiting the insider threat

Solutions that blend technology and process can help agencies improve their defenses against insider threats.

exec with laptop and phone (ImYanis/Shutterstock.com)

Cybersecurity lessons from the campaign trail

A new report offering solid technical advice for political campaigns can be useful to smaller government offices working to secure information.

software development (Legend_art/Shutterstock.com)

Stopping a cybersecurity disaster at the software development level

Developers need a frictionless approach for inserting code analysis into the software development lifecycle that provides continuous visibility and protection when pushing out new code or updates.

website security (Zeeker2526/Shutterstock.com)

Don't leave your front door open to attack

Agencies must ensure their website security can counter today's quickly evolving cyber threats so hackers don't get easy access to internal systems.

secure cloud

AWS aims to put classified data in the cloud

Amazon Web Services' new AWS Secret Region will be available to the intelligence community and other federal agencies.

people voting

How are manufacturers securing their voting machines?

Sen. Ron Wyden (D-Ore.) recently asked five of the country's top voting machine manufacturers what steps they have taken to protect their machines from cyber threats.

cybersecure new york city

NYC looks to improve cybersecurity, broadband

New York City is looking for partners on its new plan to make the city a global capital for all things cybersecurity.

How New Jersey fills the cyber info gap

The New Jersey Cybersecurity & Communications Integration Cell gives small and medium-sizes businesses a conduit to federal cyber resources.

biomonitoring

What makes hackers tick?

For a new study, ethical hackers will wear monitors that measure their biological responses as they attack computers in a network simulation.

Topic Resources

  • Security in the Cloud: Moving Beyond Compliance

    Creating a fully compliant cloud-based system is hard enough, but even that doesn’t go far enough to ensure security. As federal agencies are migrating to the cloud, some are learning best methods for creating a cloud-based security model they can trust...

  • PixelNet 2.0: The Pixel Perfect Platform

    On a large corporate campus for a major hardware manufacturer, the ability to display and manage audiovisual data is paramount. From real-time operations room video and security camera footage, to lobby signage, to streaming data and other A/V applications in conference rooms across multiple buildings, critical operations rely on accurate, real-time video data.

  • Accelerate and Maintain NIST 800-171 Compliance

    The Department of Defense (DoD) requires all contractors that process, store or transmit Controlled Unclassified Information (CUI) to have met the Defense Federal Acquisition Regulation Supplement (DFARS) minimum security standards by December 31, 2017 or risk losing their DoD contracts.3


More from 1105 Public Sector Media Group