cloud-based security (Omelchenko/

Agencies grow to trust the cloud, but still must verify

Although the cloud has demonstrated its utility, agility and scalability, federal execs underscore the importance of security.

key in cloud (Blackboard/

Securing the public cloud with HSM as a service

While traditional hardware security modules may have proved difficult to deploy in the public cloud, HSMaaS solutions offer data security and management at cloud scale.

cloud forensics

Digital forensics library for investigators

The online repository supports creating legal policy and procedures around the lawful access to evidence from public and private cloud sources.

bitcoin mining (archy13/

Cryptojacking spreads across the web

Users are being tricked into downloading scripts that use their computers to perform the complex mathematical calculations required by distributed-ledger applications.

data scan (Titima Ongkantong/

Security fundamentals: File integrity monitoring

Agencies that can shift their risk management perspective from a piecemeal approach to a holistic one focusing on integrity management will start seeing benefits that span security, compliance and IT operations.

secure network

Iowa offers public-sector network clients a la carte security services

To underscore the need for upstream cybersecurity, the Iowa Communications Network is offering its offering clients a free, extensive threat assessment.

woman working at computer (Gorodenkoff/

Connecticut tasks law enforcement with cyber duties

The Connecticut Cybersecurity Action Plan calls for a dedicated entity to investigate cybercrimes and threats to individuals, businesses and critical infrastructure.

checking data (alphaspirit/

Do you know where your data's been?

Data lineage gives IT managers visibility so they can trace errors, debug applications or recreate lost output.

blockchain (Andrew Derr/

Forging a blockchain agencies can use

Agency blockchain projects must address risk, change management and training as part of their strategy, a GAO exec says.

automated security (Oskari Porkka/

The critical need for automation in agency cyber defense

With a system of integrated, orchestrated security solutions, agencies can shorten the time to detection so that forensic analysis can begin immediately and defenses hardened.

computer hack (MARCUSZ2527/

All 50 states now have data breach notification laws

Alabama's new law takes effect June 1 and outlines what organizations and data hosting firms must do to comply.

ransomware victim (Zephyr_p/

Local governments' cybersecurity crisis in 8 charts

At least some, and perhaps even a large fraction of, local governments may be unable to respond to electronic intrusions, a recent survey finds.

Topic Resources

  • Security in the Cloud: Moving Beyond Compliance

    Creating a fully compliant cloud-based system is hard enough, but even that doesn’t go far enough to ensure security. As federal agencies are migrating to the cloud, some are learning best methods for creating a cloud-based security model they can trust...

  • Case Study: City of Fayetteville

    What if you could find out what animals needed attention at the animal shelter, which sporting equipment was used most frequently in the city gym, which parking garage spaces were available most often, and when traffic was the busiest around city hall — all in a matter of minutes, from anywhere? Although this may sound futuristic, government organizations, like the city of Fayetteville, are already using technology to solve for these questions, and much more.

  • PixelNet 2.0: The Pixel Perfect Platform

    On a large corporate campus for a major hardware manufacturer, the ability to display and manage audiovisual data is paramount. From real-time operations room video and security camera footage, to lobby signage, to streaming data and other A/V applications in conference rooms across multiple buildings, critical operations rely on accurate, real-time video data.

More from 1105 Public Sector Media Group