malware detection (Alexander Yakimov/Shutterstock.com)

Inside the fight against malware attacks

Created by researchers at University of Texas Arlington, the SEMU malware analysis system provides a comprehensive log of malware operations, making it easier for security analysts to understand what the malicious program was supposed to do.

computer workers (REDPIXEL.PL/Shutterstock.com)

Fighting cyberattacks with volunteers

Michigan's volunteer corps of cybersecurity experts from government, education and private industry is one way states can beef up their cybersecurity expertise.

Get ready for IoT-enabled threats

IoT poses security risks for DOD

A new GAO report called for the Pentagon to strengthen its policies and guidance for connected devices.

Flagged email

Why everyone still falls for fake emails

Exercises in social engineering focused on why social engineering works, how to prevent such attacks and how to gather digital evidence after an incident.

broken wineglass (Yuriy Seleznev/Shutterstock.com)

Software brittleness may harden embedded systems

Brittleness causes programs to fail fast when under attack, which allows systems to quickly detect and disrupt cyberattacks and revert to known-good states.

network (DmitriyRazinkov/Shutterstock.com)

Containment can protect IoT and cloud infrastructure from malware

Since it's impossible to provide total protection for all devices, application-layer trusted-access control can secure resources before disaster strikes.

PII (jijomathaidesigners/Shutterstock.com)

Finding PII in a haystack of data

Veritas' Classification Engine makes it easier for agencies to identify and protect sensitive data.

cybersecurity and fraud

The shifting threat landscape

The number of zero-day and web attacks both decreased in the last year, but attackers found other effective delivery methods, Symantec says.

cell phone conversation

BlackBerry's encrypted mobile service gets NSA approval

SecuSUITE for Government provides end-to-end encryption of voice calls and messages.

blockchain (Elnur/Shutterstock.com)

Illinois blockchain pilots take shape

The Illinois Blockchain Initiative is moving forward with five use cases that demonstrate how the distributed ledger technology can work in government.

internet of things devices behind open door

Locking down networks when IoT opens the door

Understanding the baseline operations of networks and internet-connected devices goes a long way to securing systems, execs say.

hacking emergency services

Hacking emergency services: How safe is the 911 system?

Recent breaches in Ohio, Texas and Washington, D.C., illustrate the cybersecurity vulnerabilities of 911 centers and other emergency services infrastructure.

Topic Resources

  • Take Cybersecurity to the Next Level

    A top challenge for every government agency today is the effective management of cybersecurity risks. Protecting government information and citizens’ personal data has become more challenging as our networks and the amount of data on them has grown exponentially. In this Executive Insights, you’ll learn how a risk-based approach leveraging automation can provide a solid foundation to your agency’s cybersecurity posture.


More from 1105 Public Sector Media Group