social media user at the airport (ShutterStock image)

DHS eyes social media as lever for ‘extreme vetting’

Browser histories, telephone contacts and social media use may help DHS supplement the sometimes spotty or even non-existent data on travelers available from their home countries.

identity and access management

Resolving trust issues in collaborative work ecosystems

Contextual access-control solutions grant access to resources according to context-based security policies.

Using deception technologies to thwart attacks and reveal targets

Using deception technologies to thwart attacks and reveal targets

Using intelligent deception, IT security teams can not only deflect attacks, but they can also detect what invaders are looking for and ultimately identify the cyber criminals and stop the attack.

Explaining cybersecurity threats in a decision-maker context (ShutterStock image)

Explaining cybersecurity threats in a decision-maker context

Cyber professionals must help decision makers understand the nature, impact and context of vulnerabilities so they understand the available courses of action, their relative costs, impacts and benefits.

Fingerprint biometrics (ShutterStock image)

Making fingerprints more reliable biometrics

The intelligence community's research arm is working on detecting fake fingerprints and developing devices to collect fingerprint data without a human operator.

 (Photo/75th Training Command, Army Reserve Maj. Adam Collett)

Army Reserve pilots management tool for cyber talent

Working with Carnegie Mellon University, the Army Reserve has developed the Cyber Warrior Database, a master repository to track the skills soldiers acquire in their civilian jobs and match them to potential military applications.

Voters (Photo by Gino Santa Maria/ShutterStock)

Voting infrastructure protections need fleshing out

The independent federal commission that helps states improve their voting systems wants more clarity on what DHS' critical infrastructure designation means.

How to secure a smartphone for the tweeter-in-chief

How to secure a smartphone for the tweeter-in-chief

Beyond ensuring overall network security, government cybersecurity specialists have several ways of locking down a smartphone.

Machine learning tool helps county detect cyber risks (Screen image by DarkTrace)

Machine learning tool helps county detect cyber risks

Officials in Livingston County, Mich., turned to a machine learning tool that can find anomalies in user and device behaviors without previous knowledge of what to look for.

Nevada Gov. Brian Sandoval  and Virginia Gov. Terry McAuliffe at the National Governors Association 2017 winter meeting (NGA photo via Twitter)

Governors put cybersecurity, broadband on front burner

At the National Governors Association winter meeting, Govs. Terry McAuliffe and Brian Sandoval both spoke about opportunities for the federal and state governments to work together and across the aisle.

Image courtesy of D-Wave

Cybersecurity firm buys next-gen quantum machine

Temporal Defense Systems plans to use the D-Wave 2000Q to solve complex cybersecurity problems affecting governments and commercial enterprises.

Overcoming ‘cyber-fatigue’ requires users to step up for security (ShutterStock image)

Overcoming ‘cyber-fatigue’ requires users to step up for security

Instead of repeating the same guidelines and recommendations of the past, it’s time to take a new and unconventional look at our approach to technology and how we secure it.


More from 1105 Public Sector Media Group