NIST previews new federal authentication guidelines

NIST previews new federal authentication guidelines

The National Institute of Standards and Technology is calling on the public to help it map out new guidelines for federal agencies' digital authentication practices.

How ID can move out of the wallet and onto the smartphone

How ID can move out of the wallet and onto the smartphone

HID Global’s goID platform lets government agencies issue identity credentials over the air to users’ smartphones, from which they can transfer relevant ID data to requestors.

4 tips for preventing cyberattacks on the workforce

Lessons from tax season: 4 tips for preventing cyberattacks on the workforce

Scams targeting employees during this recent tax season serve as a sobering reminder of the significant security risks workers unknowingly pose to their organizations.

The encryption challenge

The encryption challenge

The obstacles are daunting -- money, time, careless users, encryption-resistant legacy systems. But the risks are no less serious.

Protecting data wherever it lives

Protecting data wherever it lives

Most of today’s encryption efforts focus on data stored on servers because that is where the majority of big breaches take place.

Persistent tracking of endpoint devices takes on insider threats

Persistent tracking of endpoint devices takes on insider threats

Absolute’s Endpoint Data Discovery allows organizations to identify and protect sensitive data stored on endpoint devices outside the enterprise network.

Proving ground aims to spur rapid fielding of cyber tech

Proving ground aims to spur rapid fielding of cyber tech

To counter the pace of cyberattacks, the new Air Force Cyber Proving Ground aims to rapidly get cyber tools to operators.

What comes after common access cards?

What comes after common access cards?

The future of authentication could start with mobile devices and apps that track user location and behavior, DISA Director Lt. Gen. Alan Lynn said.

Identity management

Building on the cybersecurity sprint with CDM Phase II

Agencies that focus on a governance-based identity and access management strategy can protect against the full range of identity-centered attacks.

DOD officials push back on civil cyber support

DOD officials push back on civil cyber support critiques

During a recent panel discussion, Pentagon officials pushed back on criticisms that there is lack of clarity on how the Defense Department will respond to domestic cyberattacks.

cybersecurity confidence erodes

Feds' trust in agency cybersecurity erodes

A new survey shows a significant decline over the past two years in federal employees’ trust in their agency’s ability to protect information systems.

milware attacks

NSA's Quade: ‘Milware’ defense requires automated security

Integrating automation into network defenses will become increasingly important as threats become more sophisticated and diverse.

Topic Resources

  • Take Cybersecurity to the Next Level

    A top challenge for every government agency today is the effective management of cybersecurity risks. Protecting government information and citizens’ personal data has become more challenging as our networks and the amount of data on them has grown exponentially. In this Executive Insights, you’ll learn how a risk-based approach leveraging automation can provide a solid foundation to your agency’s cybersecurity posture.


More from 1105 Public Sector Media Group