D-Wave quantum chip (D-Wave)

Virginia Tech, D-Wave quantum center targets defense, intell

D-Wave will work with Virginia Tech to train its staff, faculty and affiliates in the intelligence and defense communities to build new applications and software tools for its quantum computers.

Six steps to securing additive manufacturing

Six steps to securing additive manufacturing

The Defense Department's maintenance and supply-chain challenges have made it a leader in additive manufacturing, but the next major hurdle will be ensuring that the technology is secure.

State Department considers handheld biometric scanning

State Department considers handheld biometric scanning

State’s Diplomatic Security Bureau wants to determine the current market capabilities and price points for either a smartphone or tablet-based solution.

Why playbooks belong in every agency’s cyber toolkit

Why playbooks belong in every agency’s cyber toolkit

Playbooks help agencies automate and standardize the security process so analysts can focus on decision making and problem solving.

fusion center

Strengthening cyber defenses through fusion center engagement

To measurably reduce cyber vulnerability, state and local governments must interact regularly with fusion centers and encourage more private companies to share information.

smartphone user (ShutterStock image)

California opens access to public business conducted on private devices

Communications by government officials in California who use personal devices or email accounts to conduct official business may be subject to disclosure under the California Public Record Acts.

Congress proposes grants for state, local cybersecurity

Congress proposes grants for state, local cybersecurity

The State Cyber Resiliency Act would set up a grant program to help develop and implement cyber resiliency plans and build a stronger cybersecurity workforce.

fingerprint scanner (photo by G. Nino, Customs and Border Protection)

Border biometrics slow to gain traction

Logistical issues are slowing down efforts to integrate biometric exit systems, according to a new Government Accountability Office report.

Hacker (ShutterStock image)

8 things hackers would like you to know

A new report goes straight to the source for insights from the people trying to pull off the next big breach.

power grid inspection (ShutterStock image)

Cybersecurity of the power grid: A growing challenge

Research into grid security is moving toward systematically analyzing the risks inherent in critical systems and methodically defending against each of them.

states claim DHS probed election systems without permission

Two more states claim DHS probed election systems without permission

The Department of Homeland Security conducted unauthorized cyber scans of election systems in Indiana and Idaho, state officials said.

Thumbs down (shutterstock image)

States resist ‘critical infrastructure’ designation for election systems

A group of state officials formally opposed the move by DHS to protect their systems through a critical infrastructure designation.

Topic Resources

  • Take Cybersecurity to the Next Level

    A top challenge for every government agency today is the effective management of cybersecurity risks. Protecting government information and citizens’ personal data has become more challenging as our networks and the amount of data on them has grown exponentially. In this Executive Insights, you’ll learn how a risk-based approach leveraging automation can provide a solid foundation to your agency’s cybersecurity posture.


More from 1105 Public Sector Media Group