The GCN dig IT Awards: Deadline extended to July 21

The GCN dig IT Awards: Deadline extended to July 21

There's one more week to make your nominations for the GCN dig IT Awards -- so please help us showcase the best examples of discovery and innovation in government IT.

intern

West Point cadets gain cyber experience in Silicon Valley internships

West Point has partnered with a small Silicon Valley startup to give cadets a chance to learn from network security professionals.

line of buses

Digging out hidden malware in San Antonio’s transit system

Even computer systems equipped with recommended cybersecurity technology can't detect all threats, which explains why a cybersecurity startup found malware on San Antonio's mass transit computer systems.

2016 GCN DIG IT AWARDS

The GCN dig IT Awards: What makes for a great nomination

The nomination deadline has been extended to July 21 -- here's how to make yours count!

Vermont’s disaster prep exercise includes cyber response

Vermont’s disaster prep exercise includes cyber response

As part of the Vigilant Guard exercise, the Vermont National Guard will provide a cyber exercise range that will simulate an intrusion within a power distribution network.

Data, drones and apps: States debate privacy protections as technology speeds ahead

Data, drones and apps: States debate privacy protections as technology speeds ahead

This year, states have enacted dozens of laws intended to give people greater control over who has access to their private activity and information, including where and how it is collected, stored, shared and used.

Hackers turn our tools against us

Hackers turn our tools against us

While malware often gets hackers into a network, once inside, they use standard networking and admin tools for reconnaissance, lateral movement and exfiltration, a new report says.

desktop security issues Windows 10

Windows 10: Desktop management and security issues

The Windows 10 update frequency will require agencies to re-evaluate oversight and controls to prevent risk.

secure government communications

4 must-haves for secure communications

In the public sector, legacy infrastructure complicates any security decision.

Why government security belongs in the cloud

Why government security belongs in the cloud

Shifting security information and event management applications to the cloud gives IT managers the agility to proactively monitor, identify and respond to threats.

Cyber threats for energy, transportation sectors on the rise

Cyber threats for energy, transportation sectors on the rise

New targets are likely to emerge or expand, and the barrier to entry for threat actors is dropping.

Cyber Guard marshals resources from government, industry

Cyber Guard marshals resources from government, industry

Over 100 public and private sector organizations gathered to test response and coordination in the event of a cyberattack on the nation’s critical infrastructure.

Topic Resources

  • Take Cybersecurity to the Next Level

    A top challenge for every government agency today is the effective management of cybersecurity risks. Protecting government information and citizens’ personal data has become more challenging as our networks and the amount of data on them has grown exponentially. In this Executive Insights, you’ll learn how a risk-based approach leveraging automation can provide a solid foundation to your agency’s cybersecurity posture.


More from 1105 Public Sector Media Group