Saving lives by letting cars talk to each other

When connected cars can be hacked from afar

As the U.S. outlines new rules for driverless car development and safety, Chinese researchers uncover vulnerabilities that can be exploited from 12 miles away.

bug bounty

Bug bounties: How federal agencies can learn from Apple

Apple's exclusive bug bounty program is one that federal agencies -- particularly the most risk-averse -- could embrace.

State computers increasingly under attack by cybercriminals

State computers increasingly under attack by cybercriminals

Although states have strengthened their defenses against hackers and cybercriminals who attack their computer networks, officials admit they’re not fully prepared for increasingly complex threats that could expose the personal information of their residents.

two-factor authentication

Two-factor authentication in two weeks

HHS' low-cost, open-source 2FA solution protects users who connect to GrantSolutions.gov -- and is poised to do even more.

DHS official:  Look beyond November on voting-system security

DHS official: Look beyond November on voting-system security

The real emphasis, according to Assistant Secretary of Cybersecurity and Communications Andy Ozment, should be on building in cybersecurity "from the get-go" on the next generation of systems.

cybersecurity expenses

Cybersecurity gains awareness, but not funding

Although cybersecurity is being woven into the fabric of government, it’s not appropriately funded, a new survey from NASCIO and Deloitte finds.

Delaware’s bet on blockchain

Delaware’s bet on blockchain

The state plans to engage technology vendors to help businesses and state agencies use blockchain technology to distribute, share, and save ledgers and contracts.

Most data breaches discovered by outsiders, McAfee report finds

Looking for data loss in all the wrong places

Organizations are not monitoring data movement in the most vulnerable places, a new McAfee Labs Threats Report suggests.

Bridging the Cybersecurity Talent Gap

Bridging the cybersecurity talent gap

Because the scope of the cybersecurity challenge is expanding, it requires developing skills for solving tomorrow's issues.

Tap DHS for help protecting voting systems, officials urge

Tap DHS for help protecting voting systems, officials urge

Officials are urging state and local governments to leverage resources from the Department of Homeland Security to better secure election systems from cyberthreats.

Protecting government cloud information with incident response

Protecting government cloud information with incident response

Preparing for a cloud security incident will ensure that both government and cloud provider IT teams can respond quickly and effectively in a crisis.

Is automation security’s only hope?

Is automation security’s only hope?

Experts at a cybersecurity workshop said that increased automation and built-in security are increasingly necessary, especially as the Internet of Things gains traction.

Topic Resources

  • Take Cybersecurity to the Next Level

    A top challenge for every government agency today is the effective management of cybersecurity risks. Protecting government information and citizens’ personal data has become more challenging as our networks and the amount of data on them has grown exponentially. In this Executive Insights, you’ll learn how a risk-based approach leveraging automation can provide a solid foundation to your agency’s cybersecurity posture.


More from 1105 Public Sector Media Group