frustrated manager

5 mistakes to avoid after a cybersecurity breach

Given the vast attack surfaces of today's systems, intrusions are nearly inevitable, but they don't have to be catastrophic.

connected home user (Nuttapol Sn/Shutterstock.com)

One-stop shopping for state services on its way

A single portal that offers online services seamlessly would lower costs for states and make transactions easier for the public.

Aging voting machines cost local, state governments

Report details election vulnerabilities uncovered at DEFCON

A new report provides a detailed look at just how vulnerable the entire election system is to hacking and urges policymakers to shore up security gaps.

responders at a house fire (Ronald Caswell/Shutterstock.com)

Secure communications across radio and cell networks

With mobile security technology added to Lockheed's Universal Communications Platform, secure communications networks can be extended to commercial smartphones.

login screen (24Novembers/Shutterstock.com)

At long last, a common login?

Login.gov is a shared identity authentication solution that lets people use a single sign-on to securely access services from multiple agencies.

System scan (Robert Lucian Crusitu/Shutterstock.com)

Finding flaws in the system

Missouri's Office of Cyber Security scans systems of enterprises that operate in the state to find common vulnerabilities.

digital key (wavebreakmedia/Shutterstock.com)

7 essential elements to effective key-management policy

Managing cryptographic keys and the policies that govern them gets even more complex when the cloud is added to the equation.

Baseline tailor

A better way to build on the NIST framework

Baseline Tailor makes it easier for users to reference the NIST cybersecurity framework to determine the security posture and then tailor a subset of the SP 800-53 security controls to make that desire a reality.

FEMA mobile derived PIV credential (FEMA)

Practical security for FEMA in the field

Federal Emergency Management Agency employees can now securely access work email, the intranet and other applications remotely by registering their mobile devices and receiving credentials derived from their FEMA-issued personal identity verification cards.

mobile phone user (Don Pablo/Shutterstock.com)

Real-time protection against malicious mobile traffic

APE was designed to monitor network traffic on smartphones and block any activity that isn’t playing by the rules, whether it comes from malware, viruses or a hacker.

cybersecurity (Rawpixel/Shutterstock.com)

NASCIO survey highlights IT consolidation, cybersecurity progress

NASCIO's latest annual survey outlines some of the challenges state IT officials face.

secure cloud fast development

IC collaboration, secure and at speed

Automated risk management and security compliance software scans the cloud environment for vulnerabilities and threats based on intelligence community standards, overlays, controls and audits.

Topic Resources

  • Security in the Cloud: Moving Beyond Compliance

    Creating a fully compliant cloud-based system is hard enough, but even that doesn’t go far enough to ensure security. As federal agencies are migrating to the cloud, some are learning best methods for creating a cloud-based security model they can trust...

  • Easing the Burden of Compliance

    Achieving and maintaining compliance continues to be a top priority for state and local governments. This is especially true when it comes to cybersecurity-related mandates. The processes for ensuring compliance remain a significant challenge because of new and evolving regulations and requirements. Agencies also struggle with reduced staff and budgets to ensure compliance. This eBook examines the current compliance landscape and how technologies like data encryption can help.

  • Using Software as a Service For Innovative Government

    As state and local government agencies continue their efforts to modernize and update their IT infrastructure to streamline operations, reduce costs, and deliver better citizen services, many are finding the Software as a Service (SaaS) model to be effective. Moving to a SaaS platform reduces the management burden on IT, improves access and scalability, reduces cost, and can actually increase security.


More from 1105 Public Sector Media Group