spreading cyber attack (fotogestoeber/Shutterstock.com)

Cyber attacks 10 years on: from disruption to disinformation

Since the cyber attack on Estonia in 2007, internet-based incursions have escalated massively, but their targets have become more diffuse, indicating future attacks may target information and opinion.

security (ranjith ravindran/Shutterstock.com)

Security depends on data classification

By identifying, organizing and classifying data, states can lay the groundwork for reducing the number of possible breaches, NASCIO finds.

selfie (kiko_kiko/Shutterstock.com)

Fighting tax fraud with electronic IDs

Several states are testing a program that leverages the authentication derived from driver's licenses to ensure tax refunds are sent to their rightful owners.

blockchain (Anton Khrupin/Shutterstock.com)

Illinois taps blockchain to spur government efficiencies

Illinois is experimenting with blockchain in five pilot programs, the state’s CTO Mike Wons told GCN.

code inspection (magic pictures/Shutterstock.com)

Air Force widens military bug bounty program

For its bug bounty program, the Air Force is opening some of its public websites to vetted security specialists from some from the United Kingdom, Canada, Australia and New Zealand.

enterprise security (LeoWolfert/Shutterstock.com)

Lean, mean cyber secure machines

Agencies need systems that are more trustworthy, secure and resilient, cyber experts say.

global network (Pushish Images/Shutterstock.com)

Police around the world learn to fight global-scale cybercrime

The multinational cooperation involved in successfully taking down the Avalanche network can be a model for future efforts in fighting digital crime.

college student on computer (HQuality/Shutterstock.com)

The secret source for cyber hires

The Scholarship for Service program produces top-quality cyber graduates who have committed to work in government. It's federally funded, but state, local and tribal agencies can reap the benefits.

information exchange (Bakhtiar Zein/Shutterstock.com)

DHS preps Cyber Incident Data Repository

CIDAR aims to identify trends, mitigate threats and calculate risks for enterprise risk managers and cybersecurity insurance companies.

health data (everything possible/Shutterstock.com)

A clean bill of health for data security

Government health care institutions and agencies can safeguard their confidential information and lower their risk of data breaches by following best practices around people, encryption and security policies.

security of financial systems

Closing the gap between technology and public policy

States are taking the lead, but are they equipped to address the complex issues of cybersecurity?

personal info under magnifying glass (tadamichi/Shutterstock.com)

Taxing times to fend off cyber fraud

Seeing the tremendous value of personal information on the average tax return, cyber criminals are hitting the IRS, the Department of Education and many businesses in hopes of stealing tax records and data.

More from 1105 Public Sector Media Group