multifactor authentication

Making multifactor authentication a reality

Modern, standards-compliant, multifactor authentication is one of the most effective ways organizations can reduce cyber risk, a new report says.

cloud-based security (Omelchenko/Shutterstock.com)

AWS expands DOD IL4, authentication services

More than a dozen cloud service applications are now available under DISA Impact Level 4 for the Amazon Web Services GovCloud.

IoT security (BeeBright/Shutterstock.com)

Keeping the IoT safe

Authentication will become more critical, and difficult, as the internet of things expands, Vint Cerf asserts.

e-signatures

How cloud-based e-signatures smooth workflow

Besides speeding approvals and enhancing security, e-signatures provide visibility into government processes.

global security (welcomia/Shutterstock.com)

Cyberattacks on governments double

To hackers, government targets may be just as attractive as banks, a new report suggests.

mobile devices (Bartolomiej Pietrzyk/Shutterstock.com)

Can government secure the mobile ecosystem?

Mobile devices pose a special risk to government, in part because commercial carriers aren't subject to the security controls that can be applied to federal networks, a new DHS report says.

cloud security (everything possible/Shutterstock.com)

How to implement enterprise-to-cloud security

Placed between cloud service providers and users, cloud access security broker solutions enforce an enterprise’s security policies.

Eye-dentify imposter detection software (DHS)

Eye-tracking tech helps CBP detect imposters

Eye-dentify tracks trainees’ eye movements during imposter detection training so instructors can provide immediate feedback on agents' performance.

businessman with smartphone (TATSIANAMA/Shutterstock.com)

NSA approves virtualization-secured smartphone

The HTC One A9 Android smartphone running the Cog Systems D4 Secure Platform has been added to the National Security Agency’s Commercial Solutions for Classified list.

cybersecurity and fraud

Michigan plans cyber analytics center

The Cyber Threat Analytics Center will use feedback from network sensors, commercially available threat feeds and physical threat modeling to prepare for cyberattacks.

Virginia mobile driver

Virginia pilots mobile driver’s license

Tests of digital driver’s licenses show the potential of the technology, the leader of Virginia’s pilot program says.

Maxwell Air Force Base (USDA/Wikimedia Commons)

Air Force tests wireless smart perimeter

Under an agreement between the Air Force and AT&T, Maxwell Air Force Base is testing a sensor network and facial recognition technology to improve base security.

Topic Resources

  • Take Cybersecurity to the Next Level

    A top challenge for every government agency today is the effective management of cybersecurity risks. Protecting government information and citizens’ personal data has become more challenging as our networks and the amount of data on them has grown exponentially. In this Executive Insights, you’ll learn how a risk-based approach leveraging automation can provide a solid foundation to your agency’s cybersecurity posture.


More from 1105 Public Sector Media Group