4 tips for securing voter data

4 tips for securing voter data

In an election year when it seems like data security is grabbing the headlines, government IT staff can improve security for their agencies and constituents.

Is GRC the answer to the cybersecurity labor shortage and skills gap?

Is GRC the answer to the cybersecurity labor shortage and skills gap?

Governance, risk management and compliance platforms can help agencies optimize operations and make the best use of limited resources.

Real-time monitoring for industrial controls

Real-time monitoring for industrial controls

A new platform by startup Claroty examines network traffic using an inspection engine designed for critical infrastructure's IC systems.

Answering the call for solutions to 911 TDoS attacks

Answering the call for solutions to 911 TDoS attacks

Experts are still dialing for dollars when it comes to ideas for how to mitigate the risk, or even the impact, of a potential telephony denial-of-service attack on the 911 emergency services system.

Is an attack on emergency services just one call away?

Is an attack on emergency services just one call away?

A recent study revealed how easy it would be for bad actors to overload and disable infrastructure for the 911 emergency services in the United States.

Can open source and education save our electronic voting systems?

Can open source and education save our electronic voting systems?

The future of online voting will depend on the federal government’s ability to work with states to enact uniform standards for voting protocols that include a verifiable voting method voters can trust.

Smartcard-based full disk encryption for mobile workers

Smartcard-based full disk encryption for mobile workers

A new ID card reader promises to ease the process for authenticating and securing access for mobile users, making it easier to manage remote employees.

Road to threat information access still uphill for local communities

Road to threat information access still uphill for local officials

Fusion centers and local law enforcement communities still face challenges accessing decentralized databases and classified data.

Dropping the ball in IT security

Dropping the ball in IT security

Although USB “drop attacks” have served as a well-known hacker exploit, a recent study shows that the scheme remains effective even among security-aware populations.

ransomware

Officials urge vigilance as ransomware cases increase

At a ransomware workshop hosted by the Federal Trade Commission, panelists advised increased cyber hygiene, patching and backups.

data privacy

NIST privacy controls should be updated

Attendees at a privacy workshop agreed that the National Institute of Standards and Technology's privacy guidance needs improvement.

4 steps for improving cyber preparedness

4 steps for improving cyber preparedness

Because state and local governments collect and store vast amounts of personal data, they are prime targets for cyberattacks.

Topic Resources

  • Take Cybersecurity to the Next Level

    A top challenge for every government agency today is the effective management of cybersecurity risks. Protecting government information and citizens’ personal data has become more challenging as our networks and the amount of data on them has grown exponentially. In this Executive Insights, you’ll learn how a risk-based approach leveraging automation can provide a solid foundation to your agency’s cybersecurity posture.


More from 1105 Public Sector Media Group