hidden cobra botnet

US-CERT details North Korean bot

The alert from the U.S. Computer Emergency Readiness Team explains how network defenders can detect and mitigate the Hidden Cobra DDOS botnet.

login as root

Weave your cybersecurity tactics into a cohesive strategy

By protecting the credentials used to spread an attack, IT managers can mitigate damage after an initial breach.

quantum computing (Brookhaven National Lab)

How quantum mechanics can change computing

Although large-scale quantum computers do not yet exist, they may hold the key to the future of internet security.

risk management

How agencies can comply with the cyber executive order

The risk-management approach requires agencies to have a clear and detailed understanding of their IT environment.

community meeting (Rawpixel.com/Shutterstock.com)

Communities forming around blockchain for government

The Government Blockchain Association and DC Blockchain Center are bringing public- and private-sector officials together to leverage the technology in the government space.

facial recognition for drivers license

NY's facial recognition program continues to nab fraudsters

To date, the technology has flagged more than 21,000 cases of possible identity fraud.

USS John S. McCain (Navy photo by Petty Officer 3rd Class James Vazquez)

Cyber suspicions floated after latest ship collision

The Navy says there is no sign of cyber intrusion, but "all possibilities" will be investigated.

smart grid rolling out (DarwelShots/Shutterstock.com)

NIST tackles smart grid framework update

The entire energy ecosystem has shifted since the National Institute of Standards and Technology last updated its guidelines for smart grid interoperability.

hacker (Dmitry Tishchenko/Shutterstock.com)

Tracing the sources of today's Russian cyber threat

Some of the most talented and dangerous cyber warriors and criminals come from Russia, a long-time meddler in other nations' digital systems.

Los Angeles is launching Cyber Lab

LA launches Cyber Lab to share threat data

The public-private partnership will disseminate threat intelligence generated by the Los Angeles Integrated Security Operations Center.

voting (Alexandru Nika/Shutterstock.com)

Defending the 'front line' against election fraud

Counties and local municipalities need help -- and funding -- to defend their election systems from security threats.

whatsapp (dennizn/Shutterstock.com)

End-to-end encryption isn't enough security for 'real people'

Computer scientists must improve security where we are most vulnerable -- on our own devices.

Topic Resources

  • Security in the Cloud: Moving Beyond Compliance

    Creating a fully compliant cloud-based system is hard enough, but even that doesn’t go far enough to ensure security. As federal agencies are migrating to the cloud, some are learning best methods for creating a cloud-based security model they can trust...

  • Easing the Burden of Compliance

    Achieving and maintaining compliance continues to be a top priority for state and local governments. This is especially true when it comes to cybersecurity-related mandates. The processes for ensuring compliance remain a significant challenge because of new and evolving regulations and requirements. Agencies also struggle with reduced staff and budgets to ensure compliance. This eBook examines the current compliance landscape and how technologies like data encryption can help.

  • Using Software as a Service For Innovative Government

    As state and local government agencies continue their efforts to modernize and update their IT infrastructure to streamline operations, reduce costs, and deliver better citizen services, many are finding the Software as a Service (SaaS) model to be effective. Moving to a SaaS platform reduces the management burden on IT, improves access and scalability, reduces cost, and can actually increase security.


More from 1105 Public Sector Media Group