NIST calls for holistic approach to security

NIST calls for holistic approach to security

Special Publication 800-160 urges organizations to address security throughout the systems engineering process.

4 tips for bug bounty programs

4 tips for bug bounty programs

A well-run program offers agencies a way to extend their penetration testing and network monitoring programs.

autonomous vehicles

Driverless car policy aims to accelerate safe deployment

The Federal Automated Vehicles Policy provides a framework to improve roadway safety and provide direction for the next administration.

bug bounty

Army fires up bug bounty program

Following the Pentagon’s successful bug bounty program, the Army has announced its own "Hack the Army" program to tighten up security on its public-facing websites.

Cybersecurity for the oil industry supply chain

Cybersecurity for the oil industry supply chain

Based on the Cybersecurity Framework, the voluntary guidelines will help the maritime industry secure its IT infrastructure.

government data

State CIOs sketch out priorities for Trump administration

The National Association of State Chief Information Officers plans to release advocacy priorities for the incoming administration.

cloud encrypted gateway

Finding FedRAMP’s missing piece

Cloud encryption gateways provide agencies a critical layer of security in moving data to the cloud.

Why ISPs don’t throttle DDoS traffic

Why ISPs don’t throttle DDoS traffic

Blocking suspect traffic could pose a legal problem for internet service providers because they don't have liability protections and are obligated by law to continue service.

Evaluating cybersecurity risk

Evaluating cybersecurity risk

A NIST self-assessment tool blends organizational performance evaluation strategies from the Baldrige Performance Excellence Program with risk management standards, guidelines and best practices from the Cybersecurity Framework.

NIST bumps up release of security guidance

NIST bumps up release of security guidance

As recent Internet of Things-enabled DDoS attacks highlight the growing attack surface, the National Institute of Standards and Technology is releasing the latest version of Special Publication 800-160 early.

What it takes to review 650,000 emails

What it takes to review 650,000 emails

Although Donald Trump argued it wasn’t possible to review 650,000 emails in eight days, cyber forensics experts said it’s quite common.

critical infrastructure weaken

The invisible -- but growing -- threat to critical infrastructure

At a recent panel on cybersecurity, experts agreed that the threat to the nation’s critical infrastructure is becoming acute as more connected devices come online.

Topic Resources

  • Take Cybersecurity to the Next Level

    A top challenge for every government agency today is the effective management of cybersecurity risks. Protecting government information and citizens’ personal data has become more challenging as our networks and the amount of data on them has grown exponentially. In this Executive Insights, you’ll learn how a risk-based approach leveraging automation can provide a solid foundation to your agency’s cybersecurity posture.


More from 1105 Public Sector Media Group