Secure file transfer: The cornerstone of digital government

Secure file transfer: The cornerstone of digital government

With encrypted file transfer, city departments can quickly and efficiently process requests involving sensitive information.

GCN Government Executive of the Year: Ron Ross

Government Executive of the Year: Ron Ross

If the discussion involves information security, NIST’s technology fellow is almost certainly shaping it.

Cyber defense front and center at NIE

Cyber defense front and center at NIE

Officials described the increased focus on cybersecurity and cyber defense at the semi-annual Network Integration Evaluation.

Is STARTTLS enough for email security?

Is STARTTLS enough for email security?

STARTTLS, a common method for encrypting email in transit, does not protect against other major security concerns and is not the only option within the federal government.

Build public trust by tightening security preparedness

Build public trust by tightening security preparedness

By addressing issues of data governance and social responsibility, agencies can rebuild the public trust lost in recent security breaches.

Terrorism info-sharing network gets health check

Terrorism info-sharing network gets health check

The state of the nation’s Information Sharing Environment is ‘strong,’ says ISE program manager.

research into behavior based mobile security

DHS funds behavior-based tech to enhance mobile security

Northrop Grumman will leverage university research to develop more secure methods for authenticating users while eliminating the need for passwords.

Dynamic firewall to help defend from DDoS attacks

Dynamic firewall to help defend from DDoS attacks

With DHS funding, Waverly Labs is developing a software-defined perimeter that would open up the firewall only when it gets single packet authorization from the network client.

Removing the blindfold to inspect encrypted communications

Without visibility into encrypted communications, IT managers can see only a portion of their network traffic, making them unable to identify and defend against threats.

Virtualization can double breach recovery costs

Virtualization can double breach recovery costs

According to a recent survey by Kaspersky Lab, the average cost of breaches involving virtual infrastructure can be double those that occur in a traditional environment.

MorphoTrust moves biometric authentication to the cloud

MorphoTrust moves biometric authentication to the cloud

The Identix trusted identity-as-a-service biometric platform can help agencies prevent fraud and identity theft and enhance authentication.

NIST announces latest funding for trusted identies

NIST announces latest funding for trusted identities

The National Institute of Standards and Technology has awarded $3.7 million in grants to three companies to make online transactions more secure and private.


More from 1105 Public Sector Media Group