block chain on the horizon for government

Blockchain on the government horizon

The technology that powers Bitcoin has the potential to address government trust and security issues.

Open redirects persist on government sites

Open redirects persist on government sites

Spammers are taking advantage of misconfigured dot-gov domains and link shorteners to redirect visitors to other sites.

NIST updates telework security guidance

NIST updates telework security guidance

The National Institute of Standards and Technology is revising its 2009 telework guides to cover the booming use of employee, contractor and vendor devices to access agency resources.

Toolkit boosts Army network visibility, cybersecurity compliance

Toolkit boosts Army network visibility, cybersecurity compliance

With the new Assured Compliance Assessment Solution Reporting Toolkit, the Army is automating cybersecurity management.

Endgame cybersecurity platform

Endgame tracks down adversaries in AF Red Flag exercise

The Endgame cybersecurity platform has helped both red and blue teams hunting and securing networks at the Air Force’s Red Flag exercise.

The newest cyber risk: Hackers can hear what you

The newest cyber risk: Hackers can hear what you're printing

Using only a smartphone, researchers were able to get enough information from signals created by a 3-D printer’s nozzle to reverse-engineer the object being manufactured.

security blindness

Security blindness: Too many alerts and too few resources

With today’s “assumption of compromise,” organizations need a unified, analytics-driven platform for end-to-end visibility across the enterprise.

SecureLogix aims to stop TDoS attacks

SecureLogix aims to stop TDoS attacks

Simple and inexpensive telephony denial-of-service attacks are increasingly targeting government phone systems.

DOD lays out cyber implementation plan

DOD lays out cyber implementation plan

DOD Cybersecurity Discipline Implementation Plan covers identity authentication, reducing networks' attack surface, device hardening and the alignment of computer network defenders with DOD IT systems and networks.

Beyond the ‘land of no’: 5 ways to balance user satisfaction and endpoint security

Beyond the ‘land of no’: 5 ways to balance user satisfaction and endpoint security

With proactive, appropriate security controls, IT managers can secure their networks, save administrative time and deliver a flexible, personalized environment for users.

HHS tightens FISMA compliance, but risks remain

HHS tightens FISMA compliance, but risks remain

While the Department of Health and Human Services has made progress in compliance with the Federal Information Security Modernization Act, it still has room to improve its security program.

Thwarting the threat actors: What government can do

Thwarting the threat actors: What government can do

While it is virtually impossible to know when cybercriminals will attack, taking certain preventative actions before an attack can certainly reduce the risk of damage.

Topic Resources

  • Take Cybersecurity to the Next Level

    A top challenge for every government agency today is the effective management of cybersecurity risks. Protecting government information and citizens’ personal data has become more challenging as our networks and the amount of data on them has grown exponentially. In this Executive Insights, you’ll learn how a risk-based approach leveraging automation can provide a solid foundation to your agency’s cybersecurity posture.


More from 1105 Public Sector Media Group