anatomy of a cyberattack

Anatomy of a cyberattack

By better understanding how cyberattacks work and applying that knowledge appropriately, organizations can better prepare for inevitable hacks.

Detecting insider threats in virtual environments

NGA seeks insider threat detection tech for virtual networks

The National Geospatial Intelligence Agency is looking for capabilities to bolster authentication and track activity across its virtual networks.

Virtualized network security

For today's government data security, trust no one

Unlike perimeter-based security, virtualized network security allows for segmenting the data center, firewalling off various sensitive areas without the need for external hardware.

Rhode Island releases state cybersecurity plan

The Rhode Island Cybersecurity Commission evaluated the state's cybersecurity infrastructure and made recommendations to enhance the resiliency of operations in executive branch agencies.

security of open source software

Why open source is a safe choice for agencies

Open source technologies combine distributed peer review and transparency, which speeds innovation and lowers costs.

Cyber, mobile and managed services:  What state CIOs are saying

Cyber, mobile and managed services: What state CIOs are saying

NASCIO's latest poll of state CIOs explores a wide range of IT problems and priorities.

Securing the smart city

Securing the smart city

State and local governments are balancing privacy, security and citizen service as the amount of available data explodes -- and finding that policy needs to catch up with the tech.

The USPS is struggling with phishing attacks

USPS staff take the bait in phishing test

U.S. Postal Service's Office of the Inspector General sent phishing emails of its own to 3,125 USPS employees, to see if staff would click on a potentially dangerous link.

Secure file transfer: The cornerstone of digital government

Secure file transfer: The cornerstone of digital government

With encrypted file transfer, city departments can quickly and efficiently process requests involving sensitive information.

GCN Government Executive of the Year: Ron Ross

Government Executive of the Year: Ron Ross

If the discussion involves information security, NIST’s technology fellow is almost certainly shaping it.

Cyber defense front and center at NIE

Cyber defense front and center at NIE

Officials described the increased focus on cybersecurity and cyber defense at the semi-annual Network Integration Evaluation.

Build public trust by tightening security preparedness

Build public trust by tightening security preparedness

By addressing issues of data governance and social responsibility, agencies can rebuild the public trust lost in recent security breaches.

Topic Resources


More from 1105 Public Sector Media Group