people voting (Gino Santa Maria/Shutterstock.com)

5 ways to address election system weaknesses

Vulnerable systems can undermine voters' confidence in the security of the process and expose sensitive voter data.

admin password (ronstik/Shutterstock.com)

Protecting systems from rogue root users

Hardware-based security can stop compromised credentials from being used to leak data.

Bitcoin (3Dsculptor/Shutterstock.com)

IRS uses tech to track bitcoin transactions

The IRS is using commercial software to help it identify bitcoin owners who avoid paying taxes on their digital currency.

password tacked to a wall (BeeBright/Shutterstock.com)

Choose better passwords with the help of science

While the password policies of the past decade have caused more user pain than security gain, researchers are finding ways to create passwords that actually work for regular people.

swat team (bibiphoto/Shutterstock.com)

Military surplus transfer expands amid security concerns

The Trump administration has lifted restrictions on the transfer of military hardware to law enforcement agencies amid watchdogs' call for tighter security.

ransomware (Bakhtiar Zein/Shutterstock.com)

Ransomware protection for backup data

BackupAssist is adding ransomware protection to its suite of data recovery tools.

security meter on excellent

Better prep for cyberattacks

A robust threat management strategy ensures the overall health and security of the environment and mitigates threats posed by employees, hostile actors and organized large-scale attacks.

AI enabled security (Tatiana Shepeleva/Shutterstock.com)

Artificial intelligence cyberattacks are coming -- but what does that mean?

Adding AI to today's cybercrime and cybersecurity world will fuel what is already a rapidly escalating arms race between attackers and defenders.

hidden cobra botnet

US-CERT details North Korean bot

The alert from the U.S. Computer Emergency Readiness Team explains how network defenders can detect and mitigate the Hidden Cobra DDOS botnet.

login as root

Weave your cybersecurity tactics into a cohesive strategy

By protecting the credentials used to spread an attack, IT managers can mitigate damage after an initial breach.

quantum computing (Brookhaven National Lab)

How quantum mechanics can change computing

Although large-scale quantum computers do not yet exist, they may hold the key to the future of internet security.

risk management

How agencies can comply with the cyber executive order

The risk-management approach requires agencies to have a clear and detailed understanding of their IT environment.

Topic Resources

  • Security in the Cloud: Moving Beyond Compliance

    Creating a fully compliant cloud-based system is hard enough, but even that doesn’t go far enough to ensure security. As federal agencies are migrating to the cloud, some are learning best methods for creating a cloud-based security model they can trust...

  • Easing the Burden of Compliance

    Achieving and maintaining compliance continues to be a top priority for state and local governments. This is especially true when it comes to cybersecurity-related mandates. The processes for ensuring compliance remain a significant challenge because of new and evolving regulations and requirements. Agencies also struggle with reduced staff and budgets to ensure compliance. This eBook examines the current compliance landscape and how technologies like data encryption can help.

  • Using Software as a Service For Innovative Government

    As state and local government agencies continue their efforts to modernize and update their IT infrastructure to streamline operations, reduce costs, and deliver better citizen services, many are finding the Software as a Service (SaaS) model to be effective. Moving to a SaaS platform reduces the management burden on IT, improves access and scalability, reduces cost, and can actually increase security.


More from 1105 Public Sector Media Group