document security (ShutterStock image)

5 ways to strengthen internal document management

Agencies that can streamline and secure their internal document management processes are better able to protect their assets.

cybersecurity threats (ShutterStock image)

Managing both acute and chronic web application security issues

Immediate actions will help agencies protect the health of their systems, but they must also address their long-term vulnerabilities.

social media scanning (ShutterStock image)

Social media screening pilots lack metrics, DHS IG says

Without measurement criteria, the pilots will be of limited use in planning and implementing a social media screening program, the agency watchdog says.

Vault 7 lessons on insider threats

Vault 7 lessons on insider threats

The WikiLeaks release of alleged CIA hacking program data shows why insider threats are still the biggest cybersecurity danger to the government and the private sector.

D-Wave quantum chip (D-Wave)

Virginia Tech, D-Wave quantum center targets defense, intell

D-Wave will work with Virginia Tech to train its staff, faculty and affiliates in the intelligence and defense communities to build new applications and software tools for its quantum computers.

Six steps to securing additive manufacturing

Six steps to securing additive manufacturing

The Defense Department's maintenance and supply-chain challenges have made it a leader in additive manufacturing, but the next major hurdle will be ensuring that the technology is secure.

State Department considers handheld biometric scanning

State Department considers handheld biometric scanning

State’s Diplomatic Security Bureau wants to determine the current market capabilities and price points for either a smartphone or tablet-based solution.

Why playbooks belong in every agency’s cyber toolkit

Why playbooks belong in every agency’s cyber toolkit

Playbooks help agencies automate and standardize the security process so analysts can focus on decision making and problem solving.

fusion center

Strengthening cyber defenses through fusion center engagement

To measurably reduce cyber vulnerability, state and local governments must interact regularly with fusion centers and encourage more private companies to share information.

smartphone user (ShutterStock image)

California opens access to public business conducted on private devices

Communications by government officials in California who use personal devices or email accounts to conduct official business may be subject to disclosure under the California Public Record Acts.

Congress proposes grants for state, local cybersecurity

Congress proposes grants for state, local cybersecurity

The State Cyber Resiliency Act would set up a grant program to help develop and implement cyber resiliency plans and build a stronger cybersecurity workforce.

fingerprint scanner (photo by G. Nino, Customs and Border Protection)

Border biometrics slow to gain traction

Logistical issues are slowing down efforts to integrate biometric exit systems, according to a new Government Accountability Office report.

Topic Resources

  • Take Cybersecurity to the Next Level

    A top challenge for every government agency today is the effective management of cybersecurity risks. Protecting government information and citizens’ personal data has become more challenging as our networks and the amount of data on them has grown exponentially. In this Executive Insights, you’ll learn how a risk-based approach leveraging automation can provide a solid foundation to your agency’s cybersecurity posture.

More from 1105 Public Sector Media Group