NIST finalizes cyberattack recovery guidance

NIST finalizes cyberattack recovery guidance

New guidance provides tactical and strategic advice for cyber event recovery planning.

IoT broadens smart cities attack surface

IoT broadens attack surface of smart cities

As smart cities start investing in connected devices, there is arguably a much broader threat vector from botnets taking advantage of the unsecured Internet of Things.

NIST quantum encryption

NIST looks for defense against code-cracking quantum machines

Pulling together quantum-resistant cryptography will take time, and NIST feels that, unless it starts now, that new cryptography won’t be ready.

State and local IT spending to grow in 2017

State and local IT spending to grow in 2017

The steady growth in state and local government IT spending will continue, as agencies look to replace legacy systems and protect against cyber threats, a recent report says.

The rise of ransomware

The rise of ransomware

With thousands of new modifications, the lucrative malware is not going away any time soon.

ransomware

3 steps to keep ahead of a ransomware attack

By protecting sensitive data, training staff to recognize threats and building a reliable response plan, agencies can ensure that a ransomware attack won’t create the ultimate crisis.

How blockchain will transform our cities

How blockchain will transform our cities

The blockchain can become the city’s operating system, invisible yet ubiquitous, improving citizens’ access to services, goods and economic opportunities.

risk-based data protection

Implementing a best practice approach to risk-based data protection

A standardized and repeatable process for the IT department and the program managers allows for advice, guidance and review of security and privacy at every step of the process.

Cybersecurity’s next phase: Cyber deterrence

Cybersecurity’s next phase: Cyber deterrence

We can strengthen cyber deterrence by improving cybersecurity, employing active defenses and establishing international norms for cyberspace.

Enterprise Linux 7.1 meets NIST crypto standards

Enterprise Linux 7.1 meets NIST crypto standards

Red Hat's platform is FIPS 140-2-certified for nine of its modules, making it a secure, open-source operating system.

3 ways to strengthen security with software supply-chain automation

3 ways to strengthen security with software supply-chain automation

Automation can give developers confidence in open-source components’ security, licensing and quality.

Greater than a wall: Building border security technology

Greater than a wall: Building border security technology

Biometric data capture, ID verification and algorithmic intelligence technologies will enhance the coverage, responsiveness and flexibility of border protection efforts.


More from 1105 Public Sector Media Group