How states stack up on cyber readiness

How states stack up on cyber readiness

The Pell Center’s report on the cyber readiness of eight states explores how states are protecting infrastructure, information and operations.

Building the 21st century vault with layered security

Building the 21st century vault with layered security

No matter where information is located -- on the network or a personal computer -- multiple layers of security must be in place to keep threats at bay.

DHS funds research to harden medical devices against cyberattacks

DHS funds research to harden medical devices against cyberattacks

Pacemakers and other devices have Internet capabilities, but all too often lack adequate security.

Are state and local governments ready for CDM?

Are state and local governments ready for CDM?

Interest in the DHS-run Continuous Diagnostics and Mitigation program has been slow to build outside of federal agencies, but other levels of government are beginning to take note.

The most important security tool for health IT

The most important security tool for health IT

Staffing alone can't solve agencies' health IT challenges, but the right workforce is absolutely critical -- and there are ways to build it more effectively.

How to deploy DNSSEC now

How to deploy DNSSEC now

Agencies' cyber arsenal should include full DNSSEC implementation to address DNS security weaknesses and help alleviate the threat of DNS cache poisoning.

SLAC National Accelerator Laboratory

How SLAC National Laboratory revamped its cybersecurity

SLAC created the Cybersecurity Improvement Plan after an audit by the Department of Energy found significant problems.

Biometrics: Unlocking government services

Biometrics: Our best bet for unlocking government services

Biometrics-enabled identity programs can help governments ensure service delivery, enhance security and increase convenience for citizens.

security DISA

DISA director outlines areas where he'd like more cyber-help

Lt. Gen. Alan Lynn thinks closer collaboration with industry could strengthen network security with three key types of IT.

More bad news for Flash-dependent websites

More bad news for Flash-dependent websites

A recent analysis by Recorded Future offers yet another reason why government agencies should reduce the use of Adobe Flash Player, as it was found to be the most frequently exploited web product.

GovRAT: Malware for today

GovRAT: Digitally signed malware

Attacks are growing more sophisticated, and stolen digital certificates are now part of the malware package.

bug bounty

Should the Army adopt a bug bounty program?

Writing in a recent journal, two Army captains advocate adoption of a bug bounty program to motivate the discovery of military network vulnerabilities.

Topic Resources


More from 1105 Public Sector Media Group