Technology enabled city (ShutterStock image)

IT, networking, smart lighting buys booming in state and local market

Cross-disciplinary IT services, connectivity and smart lighting are among the top 10 growth areas in government contracting, according to a new market research report.

How DHS hopes to harden tech against GPS spoofing (ShutterStock image)

How DHS hopes to harden tech against GPS spoofing

The Department of Homeland Security is inviting manufacturers of commercial GPS receivers used in critical infrastructure to test their equipment in a live-sky spoofing environment.

Decision makers: Get your war game on (ShutterStock image)

Decision makers: Get your war game on

With today’s war games, teams with competing interests get a chance to practice the coordination and collaboration they need to meet changes with effective response.

Report: Cities leaving their cyber assets exposed (ShutterStock image)

Report: Cities leaving their cyber assets exposed

Analysis of scans of internet-connected devices show unsecured connected assets across government and other sectors supporting critical infrastructure.

Locking down voting tech (ShutterStock image)

Locking down voting tech

State election officials are making plans to tighten security all along the voting chain -- from voter registration to machine integrity and audit trails -- with help from the Department of Homeland Security under the new critical infrastructure designation.

Today’s ransomware could become tomorrow’s security nightmare (ShutterStock image)

Today’s ransomware could become tomorrow’s security nightmare

Any weak link breached by ransom-seeking hackers can also be exploited by bad actors with more malicious goals.

A cautionary tale of IT and OT dependencies

A cautionary tale of IT and OT dependencies

An inspector general’s report identified problems at NASA that are no doubt familiar to IT managers at large organizations working keep IT and operational technology systems secure.

Self-destructing messages won’t fly in government

Self-destructing messages won’t fly in government

If Trump administration staff members are using an app that deletes messages after they are read, they may be in violation of records preservation rules.

cybersecurity (Shutterstock image)

DHS to demo cyber defenses at RSA

The Department of Homeland Security’s booth will feature 12 government-funded solutions that are ready for pilot deployment and commercialization.

FEMA

FEMA's secret weapon for risk management

Amid all the security solutions and compliance standards, the most effective tool is decidedly low tech.

containers

Locking down containers

A new security solution lets government agencies share data via cryptographically secure containers.

controlling risk (ShutterStock image)

Why government agencies must embrace CDM

The risk-based approach of the Continuous Diagnostics and Mitigation program shifts cybersecurity from solely a technical issue to an everyday business priority.

Topic Resources

  • Take Cybersecurity to the Next Level

    A top challenge for every government agency today is the effective management of cybersecurity risks. Protecting government information and citizens’ personal data has become more challenging as our networks and the amount of data on them has grown exponentially. In this Executive Insights, you’ll learn how a risk-based approach leveraging automation can provide a solid foundation to your agency’s cybersecurity posture.


More from 1105 Public Sector Media Group