Dell ships laptops with certificate vulnerabilities

Dell ships laptops with certificate vulnerabilities

The company has released a patch that fixes the flaws that could give hackers access to private information.

How SDN builds next-gen security

How SDN builds next-gen security

A shift towards software-defined security can deliver improvements in automation, virtualization and a holistic security architecture.

smartphone access to IoT in home

Making mobile phones the authentication hubs for smart homes

With funding from the National Strategy for Trusted Identities in Cyberspace, the pilots address barriers to the identity ecosystem and seed the marketplace with “NSTIC-aligned” solutions to enhance privacy, security and convenience in online transactions.

5 ways the U.S. government can get security right

5 ways the U.S. government can get security right

Although recent data breaches may indicate that computer security is harder than putting a man on the moon, the government can improve its cyber posture.

Are legacy apps a ticking time bomb?

Are legacy apps a ticking time bomb?

Recent surveys of government IT managers show increasing hand wringing when it comes to legacy systems.

Government IT and the problems that matter

Government IT and the problems that matter

Identifying and dealing with potential issues before they become problematic should be the primary goal of every agency’s IT team.

9 ways to use web proxies to limit Internet exposure

9 ways to use web proxies to limit Internet exposure

The Internet is a dangerous place. But there are concrete steps an organization can take to manage the risk while still allowing employees the access they need.

How states stack up on cyber readiness

How states stack up on cyber readiness

The Pell Center’s report on the cyber readiness of eight states explores how states are protecting infrastructure, information and operations.

Building the 21st century vault with layered security

Building the 21st century vault with layered security

No matter where information is located -- on the network or a personal computer -- multiple layers of security must be in place to keep threats at bay.

DHS funds research to harden medical devices against cyberattacks

DHS funds research to harden medical devices against cyberattacks

Pacemakers and other devices have Internet capabilities, but all too often lack adequate security.

Are state and local governments ready for CDM?

Are state and local governments ready for CDM?

Interest in the DHS-run Continuous Diagnostics and Mitigation program has been slow to build outside of federal agencies, but other levels of government are beginning to take note.

The most important security tool for health IT

The most important security tool for health IT

Staffing alone can't solve agencies' health IT challenges, but the right workforce is absolutely critical -- and there are ways to build it more effectively.

Topic Resources


More from 1105 Public Sector Media Group