cloud encrypted gateway

Finding FedRAMP’s missing piece

Cloud encryption gateways provide agencies a critical layer of security in moving data to the cloud.

Why ISPs don’t throttle DDoS traffic

Why ISPs don’t throttle DDoS traffic

Blocking suspect traffic could pose a legal problem for internet service providers because they don't have liability protections and are obligated by law to continue service.

Evaluating cybersecurity risk

Evaluating cybersecurity risk

A NIST self-assessment tool blends organizational performance evaluation strategies from the Baldrige Performance Excellence Program with risk management standards, guidelines and best practices from the Cybersecurity Framework.

NIST bumps up release of security guidance

NIST bumps up release of security guidance

As recent Internet of Things-enabled DDoS attacks highlight the growing attack surface, the National Institute of Standards and Technology is releasing the latest version of Special Publication 800-160 early.

What it takes to review 650,000 emails

What it takes to review 650,000 emails

Although Donald Trump argued it wasn’t possible to review 650,000 emails in eight days, cyber forensics experts said it’s quite common.

critical infrastructure weaken

The invisible -- but growing -- threat to critical infrastructure

At a recent panel on cybersecurity, experts agreed that the threat to the nation’s critical infrastructure is becoming acute as more connected devices come online.

Getting on the same page in cyber talent hunt

Getting on the same page in cyber talent hunt

The Cybersecurity Workforce Framework’s common language describing cybersecurity work will help organizations build a strong staff to protect their systems and data.

Five fixes for U.S. election systems

5 fixes for U.S. election systems

Two Harvard cybersecurity scholars outline the election risks and recommend several steps for federal and local governments to take after the 2016 elections.

The outbound VDI: Internet access while protecting enterprise systems

The outbound VDI: Internet access while protecting enterprise systems

An outbound virtual desktop infrastructure can significantly reduce the risks of threats to internal corporate systems and data while maintaining the benefits of internet access.

Making identity federated, portable and trusted

Making identity federated, portable and trusted

Residents of Austin, Texas, and the state of Maine are closer to having a digital identity that would allow them to conduct business with the government and other entities.

Promises and perils of quantum computing

Promises and perils of quantum computing

The rise of quantum computing is sure to bring new risks, but it also provides an opportunity for greater security.

FBI offers free online cyber investigation training

The Cyber Investigator Certification Program can help law enforcement officers improve their handling of digital evidence.


More from 1105 Public Sector Media Group