mobile security (Production Perig/Shutterstock.com)

Creating mobile security standards

Agencies are moving forward with security standards for cell phones and mobile apps under a pair of recent policy directives.

voting scrutiny (Bakhtiar Zein/Shutterstock.com)

Are states prepared to protect the next election from hackers?

A House panel heard from several experts who offered recommendations on securing elections infrastructure.

drone over solar panels (Peteri/Shutterstock.com)

Memo charges Chinese-made drones with snooping

A memo from Immigrations and Customs Enforcement's investigative arm claims small DJI drones were most likely downloading sensitive data they gathered in the U.S. to the Chinese government's cloud.

teamwork on puzzle (alphaspirit/Shutterstock.com)

Cybersecurity breaches: It's time to break the silence and work together

The more we promote intelligence sharing and the tools and processes to enable it, the more we all benefit from shared situational awareness, improved security posture and greater defensive agility.

woman working at computer (Gorodenkoff/Shutterstock.com)

Cybersecurity quest sends states to vets, students and women

States are trying to beef up their cybersecurity ranks with internships for veterans, cyber classes for students and mentoring programs for girls.

man with passport and phone (Shutterstock.com)

Extreme digital vetting of visitors to the U.S. moves forward under a new name

Immigration and Customs Enforcement officials have invited tech companies to develop algorithms that will track visa holders' social media activity.

business meeting (YanLev/Shutterstock.com)

MITRE's ATT&CK finds a home in the cybersecurity community

The threat matrix is being leveraged by organizations and incorporated into security products.

hacker at work (Alexander Geiger/Shutterstock.com)

Limiting the insider threat

Solutions that blend technology and process can help agencies improve their defenses against insider threats.

exec with laptop and phone (ImYanis/Shutterstock.com)

Cybersecurity lessons from the campaign trail

A new report offering solid technical advice for political campaigns can be useful to smaller government offices working to secure information.

software development (Legend_art/Shutterstock.com)

Stopping a cybersecurity disaster at the software development level

Developers need a frictionless approach for inserting code analysis into the software development lifecycle that provides continuous visibility and protection when pushing out new code or updates.

website security (Zeeker2526/Shutterstock.com)

Don't leave your front door open to attack

Agencies must ensure their website security can counter today's quickly evolving cyber threats so hackers don't get easy access to internal systems.

secure cloud

AWS aims to put classified data in the cloud

Amazon Web Services' new AWS Secret Region will be available to the intelligence community and other federal agencies.


More from 1105 Public Sector Media Group