HHS seeks threat information sharing system for health sector

HHS seeks threat information sharing system for health sector

The Department of Health and Human Services announces funding opportunities for an information sharing and analysis organization to improve cybersecurity in the health care sector.

DHS upgrades ICE forensics lab

DHS upgrades ICE forensics lab

The Immigration and Customs Enforcement forensics lab has beefed up its equipment and travel document library to better fight foreign terrorism.

DARPA’s all-machine cyber challenge

DARPA’s all-machine cyber challenge

This year’s Cyber Grand Challenge will be the first all-computer hacking tournament where machines will try to find and fix bugs in real time.

Putting the NIST Cyber Security Framework to work

Putting the NIST Cyber Security Framework to work

Market forces and the fear of liability may ultimately make the voluntary guidelines the de facto standard for public- and private-sector cybersecurity.

Getting government approval of a more secure OpenSSL

Getting government approval of a more secure OpenSSL

A much-improved version of the cryptographic building block lacks FIPS 140-2 validation, but SafeLogic is stepping in to change that.

Visual whitelisting software helps secure video chats

Visual whitelisting software helps secure video chats

Software developed by Duke University researchers lets users of camera-equipped devices specify what others can see, preventing inadvertent disclosure of restricted information.

Can blockchain secure health data?

Can blockchain secure health data?

The Department of Health and Human Services is looking for ideas on how blockchain can be used to address privacy, security and scalability challenges of managing electronic health records and resources.

security fatigue

How to fight security-solution fatigue

Chief information security officers listen to hundreds of company pitches for security tools and solutions every year, a new report finds.

Balancing mobility with security: What government can do

Balancing mobility with security: What government can do

Combining the basics of good IT hygiene with the powerful and unprecedented protection of today’s operating systems and processors ensures that agencies will meet the security demands of the modern, mobile workforce.

Stopping identity fraud in public assistance programs

Stopping identity fraud in public assistance programs

Identity analytics offer a more efficient way to prevent and investigate fraud.

The GCN dig IT Awards: Deadline extended to July 21

The GCN dig IT Awards: Deadline extended to July 21

There's one more week to make your nominations for the GCN dig IT Awards -- so please help us showcase the best examples of discovery and innovation in government IT.

intern

West Point cadets gain cyber experience in Silicon Valley internships

West Point has partnered with a small Silicon Valley startup to give cadets a chance to learn from network security professionals.

Topic Resources

  • Take Cybersecurity to the Next Level

    A top challenge for every government agency today is the effective management of cybersecurity risks. Protecting government information and citizens’ personal data has become more challenging as our networks and the amount of data on them has grown exponentially. In this Executive Insights, you’ll learn how a risk-based approach leveraging automation can provide a solid foundation to your agency’s cybersecurity posture.


More from 1105 Public Sector Media Group