voting (Barbara Kalbfleisch/

Attempted voting hacks a 'wake-up call,' former DHS chief says

The Russian probes and alleged attempted hacks of voting systems in the last election "exposed cyber vulnerabilities" that could have serious ramifications.

Open source and the public sector

Policies promoting open-source software may make it more difficult for agencies to ensure their code is secure.

DHS to launch federal cyber dashboard next month

Jeanette Manfra said it will use data from sensor networks to help provide information to agencies on potential threats.

Making multifactor authentication work

Iris scanners, fingerprint readers and facial recognition can give agencies strong multifactor authentication that allows password-less login experiences that are more secure and easier for the user.

common access cards

On the hunt for a CAC replacement

Defense officials are making headway on identity management tools that can eventually replace the Common Access Card.

Identity search engine compares biometrics to watch lists

Identity protection is an overdue government mission

Governments across America now need a more robust approach to provide secure digital identities for their own operations and for the citizens they serve.

careless user error

Survey: Careless errors still pose biggest threat to agency networks

Careless or untrained insiders pose more security risks to federal agencies than threats from foreign governments, malicious insiders or terrorists, according to a new survey.

passwords (image by

Using truly secure passwords: 6 essential reads

From password managers, to biometrics to emoji- or gesture-based passwords, researchers are working on ways to make it easier to secure information.

woman with connected laptop and phone (SFIO CRACHO/

On the verge of true federal IT modernization

By embracing cloud, biometrics and mobility, agencies can deliver the types of services citizens have come to expect from the private sector.

government cloud

When to purchase cloud security services

Using Gartner's cloud security hype cycle, agencies can determine when technologies are mature and stable enough for government use.

mobile security (Nata-Lia/

DHS invests in mobile app security

The Department of Homeland Security's Science & Technology Directorate is funding research to secure the entire app development lifecycle.

open lock (ESB Professional/

DHS orders Kaspersky software removed from agency systems

Citing the potential that the Russian company's products could be used by "malicious cyber actors" to gain access to federal IT systems, the Department of Homeland Security directed agencies to stop using software.

Topic Resources

  • Security in the Cloud: Moving Beyond Compliance

    Creating a fully compliant cloud-based system is hard enough, but even that doesn’t go far enough to ensure security. As federal agencies are migrating to the cloud, some are learning best methods for creating a cloud-based security model they can trust...

  • Easing the Burden of Compliance

    Achieving and maintaining compliance continues to be a top priority for state and local governments. This is especially true when it comes to cybersecurity-related mandates. The processes for ensuring compliance remain a significant challenge because of new and evolving regulations and requirements. Agencies also struggle with reduced staff and budgets to ensure compliance. This eBook examines the current compliance landscape and how technologies like data encryption can help.

  • Using Software as a Service For Innovative Government

    As state and local government agencies continue their efforts to modernize and update their IT infrastructure to streamline operations, reduce costs, and deliver better citizen services, many are finding the Software as a Service (SaaS) model to be effective. Moving to a SaaS platform reduces the management burden on IT, improves access and scalability, reduces cost, and can actually increase security.

More from 1105 Public Sector Media Group