businessman monitoring charts and graphs (Sergey Nivens/

Cutting continuous monitoring down to size

The Federal Risk and Authorization Management Program is looking to reduce the effort dedicated to continuous monitoring.

texting at work (Andrey_Popov/

Why defense in depth must include secure messaging

With the rise of SMS text messaging, agencies must defend against attacks that try to trick mobile users into clicking a compromised link, sharing personal information or downloading a malware-filled attachment.

coworkers at computer (SFIO CRACHO/

To fend off hackers, local governments get help from states

Some states are training municipal governments in cyber hygiene, sending in experts to uncover security vulnerabilities or lending a hand after a cyberattack.

employee data (kentoh/

OPM eyes blockchain for employee records

A blockchain-based employee record could help ensure personnel data can be securely shared across government.

people escaping a wave of data (Aleutie/

Understand your data before collecting more

A top-down data review helped Virginia develop a shared service model for cybersecurity.

automated processes

States see potential in intelligent automation, blockchain

CIOs for human services agencies in Georgia, Ohio and Tennessee see emerging technologies as a way to improve data quality and boost efficiency.

identity protection (Jirsak/

The identity verification arms race

Now that attackers can crack the tools we use to verify identity, it's time for government to step up, one cyber expert told a House panel.

mobile security (Production Perig/

Creating mobile security standards

Agencies are moving forward with security standards for cell phones and mobile apps under a pair of recent policy directives.

voting scrutiny (Bakhtiar Zein/

Are states prepared to protect the next election from hackers?

A House panel heard from several experts who offered recommendations on securing elections infrastructure.

teamwork on puzzle (alphaspirit/

Cybersecurity breaches: It's time to break the silence and work together

The more we promote intelligence sharing and the tools and processes to enable it, the more we all benefit from shared situational awareness, improved security posture and greater defensive agility.

drone over solar panels (Peteri/

Memo charges Chinese-made drones with snooping

A memo from Immigrations and Customs Enforcement's investigative arm claims small DJI drones were most likely downloading sensitive data they gathered in the U.S. to the Chinese government's cloud.

woman working at computer (Gorodenkoff/

Cybersecurity quest sends states to vets, students and women

States are trying to beef up their cybersecurity ranks with internships for veterans, cyber classes for students and mentoring programs for girls.

Topic Resources

  • Security in the Cloud: Moving Beyond Compliance

    Creating a fully compliant cloud-based system is hard enough, but even that doesn’t go far enough to ensure security. As federal agencies are migrating to the cloud, some are learning best methods for creating a cloud-based security model they can trust...

  • IT Consolidation: What's Next for Government Modernization Initiatives?

    IT consolidation has been a high-priority federal initiative for years. While the value is clear, it’s critical for federal IT pros to understand a key piece of the equation: to realize the full value, agencies must also consolidate their ITOM tools.

  • Case Study: City of Fayetteville

    What if you could find out what animals needed attention at the animal shelter, which sporting equipment was used most frequently in the city gym, which parking garage spaces were available most often, and when traffic was the busiest around city hall — all in a matter of minutes, from anywhere? Although this may sound futuristic, government organizations, like the city of Fayetteville, are already using technology to solve for these questions, and much more.

More from 1105 Public Sector Media Group