phishing (DesignPrax/Shutterstock.com)

DARPA enlists bots to fight social engineering

DARPA wants to take the onus for detecting phishing schemes off the employee by using bots to detect and identify the sources of social engineering campaigns.

line in airport (06photo/Shutterstock.com)

CBP plans 2018 facial recognition rollout

Customs and Border Protection aims to use facial recognition tech at the top 20 U.S. airports by February 2018, according to a senior agency official.

blockchain (Sotnikov Ivan/Shutterstock.com)

DHS looks to startups for blockchain solutions

The DHS Science and Technology Directorate urges entrepreneurs to incorporate blockchain in homeland security solutions.

voting with paper ballots (Mikko Lemola/Shutterstock.com)

Stronger election security with less technology

While installing layered defenses and purchasing more secure technology would help protect voting machines, less reliance on technology may be the best way to secure the electoral process.

Mask of human head with bar code

The steady convergence of physical and digital identity

Modern identity management requires a layered approach that supports physical and digital identities and allows enables bring-your-own-identity policies.

Legacy voting machines ripe for tampering, breakdowns

Virginia considers decertifying touchscreen voting machines

The state could accelerate the move to systems that provide a paper trail for election audits.

data privacy

How to get both better data and more privacy

The Evidence-Based Policymaking Commission is pushing for a federal service that facilitates access to data for evidence building and ensures privacy and transparency in how that data is used.

facial recognition tech that penetrates disguises (Amarjot Singh, et.al.)

Facial recognition penetrates disguises

Researchers have developed a deep learning framework that can make matches to faces even when they're obscured.

mugs of beer (Patrick Thomas/Shuterstock.com)

ABC cops use apps to spot fake IDs

Underage drinkers are using more sophisticated fake IDs, but alcohol enforcement officers in some states are using smartphone apps to scan driver’s licenses to help them quickly weed out the phonies.

power plant (ETAJOE/Shutterstock.com)

Cyberattacks target energy infrastructure

A group known as Dragonfly 2.0 appears to have gained access to operational networks of energy companies in Europe and North America, according to a new report from Symantec.

people voting (Gino Santa Maria/Shutterstock.com)

5 ways to address election system weaknesses

Vulnerable systems can undermine voters' confidence in the security of the process and expose sensitive voter data.

admin password (ronstik/Shutterstock.com)

Protecting systems from rogue root users

Hardware-based security can stop compromised credentials from being used to leak data.

Topic Resources

  • Security in the Cloud: Moving Beyond Compliance

    Creating a fully compliant cloud-based system is hard enough, but even that doesn’t go far enough to ensure security. As federal agencies are migrating to the cloud, some are learning best methods for creating a cloud-based security model they can trust...

  • Easing the Burden of Compliance

    Achieving and maintaining compliance continues to be a top priority for state and local governments. This is especially true when it comes to cybersecurity-related mandates. The processes for ensuring compliance remain a significant challenge because of new and evolving regulations and requirements. Agencies also struggle with reduced staff and budgets to ensure compliance. This eBook examines the current compliance landscape and how technologies like data encryption can help.

  • Using Software as a Service For Innovative Government

    As state and local government agencies continue their efforts to modernize and update their IT infrastructure to streamline operations, reduce costs, and deliver better citizen services, many are finding the Software as a Service (SaaS) model to be effective. Moving to a SaaS platform reduces the management burden on IT, improves access and scalability, reduces cost, and can actually increase security.


More from 1105 Public Sector Media Group