3 ways to strengthen security with software supply-chain automation

3 ways to strengthen security with software supply-chain automation

Automation can give developers confidence in open-source components’ security, licensing and quality.

Greater than a wall: Building border security technology

Greater than a wall: Building border security technology

Biometric data capture, ID verification and algorithmic intelligence technologies will enhance the coverage, responsiveness and flexibility of border protection efforts.

Client-side encryption enables Gmail for state users

Client-side encryption enables Gmail for state users

Maryland used Virtru Pro to ensure email is encrypted before it’s sent, making it compliant with requirements of the Health Insurance Portability and Accountability Act and Criminal Justice Information Services.

Biometric authentication growing for mobile devices, but security needs work

Biometric authentication growing for mobile devices, but security needs work

Hacks of phone-based fingerprint readers and facial recognition software underscore the need for multifactor identification.

How to address the 6 most overlooked causes of data breaches

How to address the 6 most overlooked causes of data breaches

By addressing weaknesses in human factors, agencies can reduce their attack surface and make every employee a soldier in the battle against cyberattacks.

Open IT, security key to smart city future

Open IT, security key to smart city future

Cities are looking for open and secure solutions to help enable smart city development, according to a new report from IDC.

Panel issues cybersecurity call to arms

Presidential panel issues cybersecurity call to arms

To highlight the nation's biggest and most urgent cybersecurity issues, a new 100-page report calls for an all-hands-on-deck approach to addressing cyber risks.

6 cyber predictions for 2017

6 cyber predictions for 2017

McAfee’s annual report on the cybersecurity landscape holds some tips for government IT managers.

Guidelines for bug reporting

Guidelines for bug reporting

Although the new policy only applies to certain websites, it aims to better protect government information by making vulnerability reporting easier.

DLA secures supply chain with DNA marking

DLA secures supply chain with DNA marking

The Defense Logistics Agency may expand its use of DNA marking technology to verify the authenticity of microchips and other electronics in its supply chain.

San Francisco latest victim of ransomware

San Francisco latest victim of ransomware

The city’s light transit systems were hit with malware that shut down ticketing machines and demanded payment.

How secured printing can control data leaks

4 ways to avoid data risk from printing

Secure document management minimizes the exposure of sensitive printed, faxed or scanned data to anyone but the personnel who have a “need to know.”

Topic Resources

  • Take Cybersecurity to the Next Level

    A top challenge for every government agency today is the effective management of cybersecurity risks. Protecting government information and citizens’ personal data has become more challenging as our networks and the amount of data on them has grown exponentially. In this Executive Insights, you’ll learn how a risk-based approach leveraging automation can provide a solid foundation to your agency’s cybersecurity posture.