Whose keys are they anyway?

Whose keys are they anyway?

Joining other cloud providers, Google hands customers the encryption keys. But is this the best way to keep agency data safe?

Trust and verify: Managing the cloud abroad and at home

Trust and verify: Managing the cloud abroad and at home

Trusted computing can help agencies manage geographically dispersed servers and emerging OpenStack deployments.

DARPA wants to take the sting out of DDoS attacks

DARPA wants to take the sting out of DDoS attacks

The Defense Advanced Research Projects Agency’s XD3 program is looking for innovative ways to mitigate and minimize the effects of DDoS attacks on networks.

Symantec takes on the Internet of unsecured things

Symantec takes on the Internet of unsecured things

The company’s Embedded Critical Systems Protection locks down the software embedded in the devices to protect against zero-day attacks and prevent compromise.

Iowa installs visual broadband monitoring system

Iowa installs visual broadband monitoring system

The Iowa Communications Network now has a way to visually track real-time network and information system disruptions and cyberattacks.

4 ways to shine a light on shadow IT

4 ways to shine a light on shadow IT

Automated management, monitoring and security tools – along with common-sense policies – can help agencies gain the upper hand against shadow IT.

Trust no one:  A better way to close the security gap?

Trust no one: A better way to close the security gap?

Least-privilege access and continuous monitoring of employees can help enterprises curtail insider threats.

The fight against health care fraud

The fight against health care fraud

Government and industry are developing increasingly sophisticated tools to see beyond the smoke screen of fraudulent claims for medical payments.

5 considerations for smarter cyber defense

5 considerations for smarter cyber defense

When evaluating and updating cybersecurity defenses, agencies should begin by considering these five underlying principles.

A new way to secure all those Excel spreadsheets

A new way to secure all those Excel spreadsheets

CellShield discovers patterns, bulk-protects and audits personally identifiable information in spreadsheets.

New service puts ID-authentication power in police officers

New service puts ID-authentication power in police officers' pockets

Intellicheck is piloting its Law ID mobile device-based authentication solution with three different law enforcement agencies.

cybersecurity risks of multifunction printers

10 steps to secure your print processes

Multifunction printers are susceptible to the same security vulnerabilities computers are, so agencies must incorporate these devices into their information security plans.


More from 1105 Public Sector Media Group