checking phones (GaudiLab/Shutterstock.com)

Securing networks in the sharing age

Thanks to social media, employees are offering up personal information that can put agencies security at risk.

communication across the power grid (chombosan/Shutterstock.com)

Persistent attacks target critical infrastructure, US-CERT says

Attacks have been targeting domain controllers and file and email servers of critical infrastructure systems, according to the U.S. Computer Emergency Readiness Team.

secure keys (shutterstock.com)

SSH keys: The elephant in the compliance room

Poor SSH key management can open agencies to threats and compliance audit failures.

compliance (EtiAmmos/Shutterstock.com)

Agencies love the Cybersecurity Framework, but loathe compliance

Automated processes can make compliance headaches a thing of the past.

Blockchain (a-image/Shutterstock.com)

Microsoft adds blockchain services to Azure Government

Microsoft brings its business capabilities for blockchain to the Azure Government cloud.

secure connection (supimol kumying/Shutterstock.com)

Commerce to leverage NOAA's TIC

Several bureaus at Commerce will be getting Trusted Internet Connection access from the National Oceanic and Atmospheric Administration.

Jumping on the blockchain bandwagon

Creating a blockchain playbook for government

A blockchain primer gives agencies a foundational understanding of the distributed ledger technology.

fraud investigation (Shutterstock.com)

Tracking down 'most wanted' insurance fraud suspects

Because it can take a long time to track down alleged insurance scammers who fail to appear in court, some state insurance officials say placing them on an online most wanted list, just like the FBI and U.S. Marshals Service do, can be a useful tool.

phishing (wk1003mike/Shutterstock.com)

Why phishing attacks are increasingly targeting the public sector (and what you can do about it)

Many agencies rely on legacy email security solutions that fail to address today's sophisticated phishing attacks.

HHS tightens FISMA compliance, but risks remain

Unsupported software threatens medical devices, networks

Unpatched known vulnerabilities can open agencies up to internet of things based attacks and ransomware, according to a senior HHS official.

tech budget

Budgeting for security products: What CISOs need to know

Chief information security officers must consider the threat surface, the adequacy of legacy products and the availability of innovative security solutions to decide how secure their agencies.

government cloud solutions

Azure Government beefs up security solutions

Microsoft is adding more capabilities for classified data and strengthening security management in Azure for government cloud customers.

Topic Resources

  • Security in the Cloud: Moving Beyond Compliance

    Creating a fully compliant cloud-based system is hard enough, but even that doesn’t go far enough to ensure security. As federal agencies are migrating to the cloud, some are learning best methods for creating a cloud-based security model they can trust...

  • IT Consolidation: What's Next for Government Modernization Initiatives?

    IT consolidation has been a high-priority federal initiative for years. While the value is clear, it’s critical for federal IT pros to understand a key piece of the equation: to realize the full value, agencies must also consolidate their ITOM tools.

  • Case Study: City of Fayetteville

    What if you could find out what animals needed attention at the animal shelter, which sporting equipment was used most frequently in the city gym, which parking garage spaces were available most often, and when traffic was the busiest around city hall — all in a matter of minutes, from anywhere? Although this may sound futuristic, government organizations, like the city of Fayetteville, are already using technology to solve for these questions, and much more.


More from 1105 Public Sector Media Group