Can blockchain bring interoperability to healthcare?

CDC eyes blockchain for exchanging health data during disasters

The Centers for Disease Control and Prevention is experimenting with the distributed ledger technology to monitor the spread of infectious diseases in crisis situations.

paper ballot

Russian hacking fuels return to paper ballots

Amid security concerns over Russian hackers targeting state voting systems in 2016, there's a renewed focus on shifting to analog solutions.

bank vault

Information security in government IT: Lessons learned from the financial industry

Enterprise cloud migration and over-the-cloud PII protection can be less challenging for agencies if they draw from the experiences of early adopters in the financial industry.

man with bluetooth ear piece

BlueBorne and wireless risk: Going beyond NIST and standard frameworks

Wireless security is rampant with undiscovered vulnerabilities and insecure protocols that have been paid scarce little attention despite some having been successfully exploited.

voting (Barbara Kalbfleisch/Shutterstock.com)

Attempted voting hacks a 'wake-up call,' former DHS chief says

The Russian probes and alleged attempted hacks of voting systems in the last election "exposed cyber vulnerabilities" that could have serious ramifications.

Open source and the public sector

Policies promoting open-source software may make it more difficult for agencies to ensure their code is secure.

DHS to launch federal cyber dashboard next month

Jeanette Manfra said it will use data from sensor networks to help provide information to agencies on potential threats.

Making multifactor authentication work

Iris scanners, fingerprint readers and facial recognition can give agencies strong multifactor authentication that allows password-less login experiences that are more secure and easier for the user.

common access cards

On the hunt for a CAC replacement

Defense officials are making headway on identity management tools that can eventually replace the Common Access Card.

Identity search engine compares biometrics to watch lists

Identity protection is an overdue government mission

Governments across America now need a more robust approach to provide secure digital identities for their own operations and for the citizens they serve.

careless user error

Survey: Careless errors still pose biggest threat to agency networks

Careless or untrained insiders pose more security risks to federal agencies than threats from foreign governments, malicious insiders or terrorists, according to a new survey.

passwords (image by shutterstock.com)

Using truly secure passwords: 6 essential reads

From password managers, to biometrics to emoji- or gesture-based passwords, researchers are working on ways to make it easier to secure information.

Topic Resources

  • Take Cybersecurity to the Next Level

    A top challenge for every government agency today is the effective management of cybersecurity risks. Protecting government information and citizens’ personal data has become more challenging as our networks and the amount of data on them has grown exponentially. In this Executive Insights, you’ll learn how a risk-based approach leveraging automation can provide a solid foundation to your agency’s cybersecurity posture.


More from 1105 Public Sector Media Group