IARPA releases BAA for virtual user environment

IARPA releases BAA for virtual user environment

The Intelligence Advanced Research Projects Activity is looking for a virtual user environment that can support the kind of security analytics required to protect sensitive government users or workloads.

An auditable election system for 2020

An auditable election system for 2020

Travis County, Texas, is working to combine the convenience of electronic voting and the record of paper ballots into one system.

call center tdos

DHS working to protect emergency call centers against denial-of-service attacks

With more government services facing potential cyberthreats, the Department of Homeland Security is working to lower the risk and impact of potential telephone system-based attacks on 911 call centers.

 ‘Clunky,’ low-tech voting system still vulnerable to hacks

‘Clunky,’ low-tech voting system still vulnerable to hacks

A new report outlines a range of vulnerabilities, infiltration points and tactics that could be used to undermine credibility in an election or even manipulate the results.

Continuous risk mandates continuous protections

Continuous risk mandates continuous protections

Updates to A-130 make continuous privacy and vulnerability monitoring responsibilities of every agency.

Backing up to stay ahead of hackers

Backing up to stay ahead of hackers

The Barnstable Police Department thwarts ransomware attacks with technology that more frequently and inexpensively copies and stores its data.

Virginia builds cyber foundation for government, business

Virginia builds cyber foundation for government, business

Gov. Terry McAuliffe said he wants other states to follow Virginia’s lead in cybersecurity.

Hayden: Russian email hack is

Hayden: Russian email hack is 'honorable state espionage'

The former CIA and NSA director discusses Russia's recent hacks of Democratic party emails as well as Apple's stand against the FBI over encryption.

firefighter on radio

Why are first responders turning away from radio encryption?

Public safety agencies are turning off their radio encryption over concerns of not being heard by nearby departments using older devices.

Criminals increasingly hold government computers for ransom

Criminals increasingly hold government computers for ransom

Cyber-age extortionists are preying on state and local governments, hospitals and even police departments, forcing officials to decide whether to meet the demands or risk losing their data.

2016 DIG IT winners

Discovery and innovation in government IT: The 2016 dig IT Award winners

DARPA, FEMA, NGA, Prince George's County, New Jersey's Parole Board and the Ark-Tex Council of Governments take top honors.

Deception for protection

Deception for protection

Using deception tools as cybersecurity measures can not only protect critical information, but also detect intrusions.

Topic Resources

  • Take Cybersecurity to the Next Level

    A top challenge for every government agency today is the effective management of cybersecurity risks. Protecting government information and citizens’ personal data has become more challenging as our networks and the amount of data on them has grown exponentially. In this Executive Insights, you’ll learn how a risk-based approach leveraging automation can provide a solid foundation to your agency’s cybersecurity posture.


More from 1105 Public Sector Media Group