password tacked to a wall (BeeBright/Shutterstock.com)

Choose better passwords with the help of science

While the password policies of the past decade have caused more user pain than security gain, researchers are finding ways to create passwords that actually work for regular people.

swat team (bibiphoto/Shutterstock.com)

Military surplus transfer expands amid security concerns

The Trump administration has lifted restrictions on the transfer of military hardware to law enforcement agencies amid watchdogs' call for tighter security.

security meter on excellent

Better prep for cyberattacks

A robust threat management strategy ensures the overall health and security of the environment and mitigates threats posed by employees, hostile actors and organized large-scale attacks.

ransomware (Bakhtiar Zein/Shutterstock.com)

Ransomware protection for backup data

BackupAssist is adding ransomware protection to its suite of data recovery tools.

AI enabled security (Tatiana Shepeleva/Shutterstock.com)

Artificial intelligence cyberattacks are coming -- but what does that mean?

Adding AI to today's cybercrime and cybersecurity world will fuel what is already a rapidly escalating arms race between attackers and defenders.

hidden cobra botnet

US-CERT details North Korean bot

The alert from the U.S. Computer Emergency Readiness Team explains how network defenders can detect and mitigate the Hidden Cobra DDOS botnet.

login as root

Weave your cybersecurity tactics into a cohesive strategy

By protecting the credentials used to spread an attack, IT managers can mitigate damage after an initial breach.

quantum computing (Brookhaven National Lab)

How quantum mechanics can change computing

Although large-scale quantum computers do not yet exist, they may hold the key to the future of internet security.

risk management

How agencies can comply with the cyber executive order

The risk-management approach requires agencies to have a clear and detailed understanding of their IT environment.

community meeting (Rawpixel.com/Shutterstock.com)

Communities forming around blockchain for government

The Government Blockchain Association and DC Blockchain Center are bringing public- and private-sector officials together to leverage the technology in the government space.

facial recognition for drivers license

NY's facial recognition program continues to nab fraudsters

To date, the technology has flagged more than 21,000 cases of possible identity fraud.

USS John S. McCain (Navy photo by Petty Officer 3rd Class James Vazquez)

Cyber suspicions floated after latest ship collision

The Navy says there is no sign of cyber intrusion, but "all possibilities" will be investigated.

Topic Resources

  • Security in the Cloud: Moving Beyond Compliance

    Creating a fully compliant cloud-based system is hard enough, but even that doesn’t go far enough to ensure security. As federal agencies are migrating to the cloud, some are learning best methods for creating a cloud-based security model they can trust...

  • Case Study: City of Fayetteville

    What if you could find out what animals needed attention at the animal shelter, which sporting equipment was used most frequently in the city gym, which parking garage spaces were available most often, and when traffic was the busiest around city hall — all in a matter of minutes, from anywhere? Although this may sound futuristic, government organizations, like the city of Fayetteville, are already using technology to solve for these questions, and much more.

  • PixelNet 2.0: The Pixel Perfect Platform

    On a large corporate campus for a major hardware manufacturer, the ability to display and manage audiovisual data is paramount. From real-time operations room video and security camera footage, to lobby signage, to streaming data and other A/V applications in conference rooms across multiple buildings, critical operations rely on accurate, real-time video data.

  • Accelerate and Maintain NIST 800-171 Compliance

    The Department of Defense (DoD) requires all contractors that process, store or transmit Controlled Unclassified Information (CUI) to have met the Defense Federal Acquisition Regulation Supplement (DFARS) minimum security standards by December 31, 2017 or risk losing their DoD contracts.3

  • Easing the Burden of Compliance

    Achieving and maintaining compliance continues to be a top priority for state and local governments. This is especially true when it comes to cybersecurity-related mandates. The processes for ensuring compliance remain a significant challenge because of new and evolving regulations and requirements. Agencies also struggle with reduced staff and budgets to ensure compliance. This eBook examines the current compliance landscape and how technologies like data encryption can help.


More from 1105 Public Sector Media Group