ransomware (Nicescene/Shutterstock.com)

When it comes to ransomware, it’s sometimes best to pay up

Paying up may be the rational choice for some organizations, but given that cybercriminals go where the money is, the repercussions for others could be significant.

form asking for SSN (Ekaterina_Minaeva/Shutterstock.com)

Social Security numbers: a security risk with serious staying power

Despite the risk of fraud and identity theft posed by the use of Social Security numbers as identifiers, agencies continue to use them.

encrypted data in the cloud

Computing with encrypted data

Researchers are working on ways to optimize fully homomorphic encryption, which allows manipulation of encrypted data, for real-world applications.

investigation (alphaspirit/Shutterstock.com)

Cybercrime investigation: Where geek meet gumshoe

A new publication outlines a standard for investigating and preventing today’s complex and sophisticated cybercrime.

broken lock (By Sergey Nivens/Shutterstock.com)

US-CERT urges fast patch to Samba vulnerability

The newly announced flaw has lurked in the popular open-source software for years.

people voting in California

DEFCON to target voting machines

This summer’s hacker conference will give attendees a chance to apply their skills to manipulating voting machines.

facial recognition (Zapp2Photo/Shutterstock.com)

House committee looks into cities’ facial recognition tech

The House Committee on Oversight and Reform has sent letters to big-city mayors asking for documentation on their systems.

secure network (bluebay/Shutterstock.com)

White House aims to harden agency networks

President Donald Trump’s recent executive order on cybersecurity means the White House will take a hard look at eliminating weak links in federal networks.

black hat, gray hat and white hat hackers (By MatiasDelCarmine/Shutterstock.com)

An ethical hacker can help you beat a malicious one

Organizations that engage the services of an ethical hacker can find and fix vulnerabilities on their systems rather than have them exploited.

cybersecurity (By deepadesigns/Shutterstock.com)

The one fix needed to keep Trump's cyber executive order from failing

Without a trustworthy operating system -- especially for critical infrastructure -- real cybersecurity is scientifically impossible.

innovation (ESB Professional/Shutterstock.com)

Don't forget your dig IT nominations

Help GCN showcase great examples of discovery and innovation in government IT.

wannacry ransomware

‘WannaCry’ ransomware attack raises alarm bells for cities, states

IT officials say they often don’t have enough money to effectively fight sophisticated cyber threats, especially one of this scale.

Topic Resources

  • Take Cybersecurity to the Next Level

    A top challenge for every government agency today is the effective management of cybersecurity risks. Protecting government information and citizens’ personal data has become more challenging as our networks and the amount of data on them has grown exponentially. In this Executive Insights, you’ll learn how a risk-based approach leveraging automation can provide a solid foundation to your agency’s cybersecurity posture.

More from 1105 Public Sector Media Group