A 5-point plan for cyber fitness

A 5-point plan for cyber fitness

An effective cybersecurity plan must not just address the problems outlined in the 30-day cybersecurity sprint, but also the underlying issues that have kept agencies from fully complying with existing security programs.

NJ partnership fights financial cyber threats

NJ partnership fights financial cyber threats

The New Jersey Cybersecurity and Communications Integration Cell hopes to detect attacks aimed at banking institutions with the help of shared threat intelligence.

States crack down on driver

States crack down on driver's license fraud

States increasingly are employing facial recognition software to compare driver’s license or ID photos with other images on file.

cybersecurity tools for the electric grid

Grid security as a service?

Vencore Labs’ SecureSMART solution helps utilities detect early signs of attacks on wireless networks and validate security controls in the electric grid.

Cyber Innovation Center at the National Cyber Research Park

New cyber programs debut in California, Louisiana

Louisiana Tech and the University of San Diego have launched programs to support public-private cybersecurity research and build a cyber-savvy workforce.

derived credentials for smartphones

How to protect data for the always connected employee

The key to enhancing mobile security is combining a secure digital identity with a second authentication factor such as a PIN or fingerprint to let employees use their devices to authenticate themselves for physical and digital access.

OPM data breach

OPM: 21.5 million affected by background-check breach

The Office of Personnel Management warned that anyone who has submitted to a background check since 2000 is likely at risk — as are some of the family and associates listed on their applications.

How US-CERT gets the word out

How US-CERT gets the word out

The U.S. Computer Emergency Readiness Team collaborates with other federal agencies and industry to quickly disseminate cyber threat alerts.

results of cybersecurity sprint

Nearing the finish line: What to expect from the cybersecurity sprint

Following recent cyber breaches, U.S. CIO Tony Scott ordered a cybersecurity sprint to rapidly evaluate problem areas. As that 30-day dash comes to a close, experts weigh in on the likely outcomes.

DHS expands access to virtual cybersecurity training

DHS expands access to virtual cybersecurity training

The Department of Homeland Security expands its FedVTE program, giving state, local, tribal and territorial government employees free access to cybersecurity training.

Phishing schemes mimic OPM breach notifications

Phishing schemes mimic OPM breach notifications

US-CERT warns feds to look carefully before clicking on those emails about identity-protection services.

John Hancock signature

More than patriotic: Independent e-signature technology

No one denies that John Hancock signed the Declaration of Independence. An e-signature should provide same irrefutable verification for centuries to come.

More from 1105 Public Sector Media Group