The fight against health care fraud

The fight against health care fraud

Government and industry are developing increasingly sophisticated tools to see beyond the smoke screen of fraudulent claims for medical payments.

5 considerations for smarter cyber defense

5 considerations for smarter cyber defense

When evaluating and updating cybersecurity defenses, agencies should begin by considering these five underlying principles.

A new way to secure all those Excel spreadsheets

A new way to secure all those Excel spreadsheets

CellShield discovers patterns, bulk-protects and audits personally identifiable information in spreadsheets.

New service puts ID-authentication power in police officers

New service puts ID-authentication power in police officers' pockets

Intellicheck is piloting its Law ID mobile device-based authentication solution with three different law enforcement agencies.

cybersecurity risks of multifunction printers

10 steps to secure your print processes

Multifunction printers are susceptible to the same security vulnerabilities computers are, so agencies must incorporate these devices into their information security plans.

how facial recognition technology works

A closer look at facial recognition

Facial recognition is emerging as an authentication method more accurate than passwords – but how do these systems work?

USMobile

NSA-grade encryption for mobile over untrusted networks

The Scrambl3 app creates a secure virtual-private network that connects BYOD smartphones to an agency server to send messages with end-to-end encryption.

NIST issues SHA-3 cryptographic hash standard

NIST issues SHA-3 cryptographic hash standard

NIST calls the new standard, which is based on an instance of the KECCAK algorithm, “a next-generation tool for securing the integrity of electronic information.”

Using a private cloud for healthcare data

How to secure a private cloud for health care data

When considering a private cloud in health care, be sure to conduct ample research, develop a solid risk management policy and ensure that business objectives are met.

DISA updates draft cloud security guidelines

DISA updates draft cloud security guidelines

The Defense Information Systems Agency recently released a new draft of security standards as the Defense Department moves to a cloud environment.

7 cybersecurity questions to expect after the OPM breach

7 cybersecurity questions to expect after the OPM breach

To ensure your organization is not next in the limelight for all the wrong reasons, the answers to these questions better be the right ones.

Topic Resources

  • GameChanger: Microsegmentation

    In less than a decade, more than 87 million records with sensitive or private information have been exposed due to cyber-incidents on federal networks alone. Increasingly, organizations are beginning to realize that perimeter-based security just isn’t enough anymore. Download to learn how for many data centers, the solution is microsegmentation.


More from 1105 Public Sector Media Group