IT security spending priorities don’t match threats

IT security spending priorities don’t match threats

A survey of Black Hat 2015 attendees reveals a disparity between “the threats that keep security professionals awake at night and the tasks that keep them occupied during the day.”

CBP tests handheld biometric devices to collect exit data

CBP tests handheld biometric devices to collect exit data

Customs and Border Protection will collect fingerprints and passport information and compare it to the same data that was collected when the traveler arrived in the United States.

How to avoid becoming the next OPM

How to avoid becoming the next OPM

Platform analytics can provide state and local governments with both proactive detection and defensive threat mitigation -- and the information learned can be shared across departments.

data loss prevention

Preventing data breaches from becoming data disasters

Data loss prevention solutions monitor the network for leaks from endpoint devices such as USBs, printers and mobile devices.

What the U.K. Government Digital Service learned about permissions

What the U.K. Government Digital Service learned about permissions

Lessons from a digital-government pioneer on how to think about providing better citizen service.

A 5-point plan for cyber fitness

A 5-point plan for cyber fitness

An effective cybersecurity plan must not just address the problems outlined in the 30-day cybersecurity sprint, but also the underlying issues that have kept agencies from fully complying with existing security programs.

NJ partnership fights financial cyber threats

NJ partnership fights financial cyber threats

The New Jersey Cybersecurity and Communications Integration Cell hopes to detect attacks aimed at banking institutions with the help of shared threat intelligence.

States crack down on driver

States crack down on driver's license fraud

States increasingly are employing facial recognition software to compare driver’s license or ID photos with other images on file.

cybersecurity tools for the electric grid

Grid security as a service?

Vencore Labs’ SecureSMART solution helps utilities detect early signs of attacks on wireless networks and validate security controls in the electric grid.

Cyber Innovation Center at the National Cyber Research Park

New cyber programs debut in California, Louisiana

Louisiana Tech and the University of San Diego have launched programs to support public-private cybersecurity research and build a cyber-savvy workforce.

derived credentials for smartphones

How to protect data for the always connected employee

The key to enhancing mobile security is combining a secure digital identity with a second authentication factor such as a PIN or fingerprint to let employees use their devices to authenticate themselves for physical and digital access.

OPM data breach

OPM: 21.5 million affected by background-check breach

The Office of Personnel Management warned that anyone who has submitted to a background check since 2000 is likely at risk — as are some of the family and associates listed on their applications.

Topic Resources


More from 1105 Public Sector Media Group