worker typing (HAKINMHAN/Shutterstock.com)

DIUx taps Plurilock for AI authentication

Defense officials are adding an additional layer of security to workplace computing through an artificial-intelligence system that monitors keystrokes and mouse behavior of individual users.

GCN dig IT awards

Deadline extended for 2017 dig IT award nominations

You have until July 15 to help GCN identify the innovative tech that's transforming government at all levels.

hybrid IT

Hybrid IT and data security musts

The key to an agency's successful cloud or hybrid IT implementation is to understand and maximize its cloud security posture in advance of the move.

 ‘Clunky,’ low-tech voting system still vulnerable to hacks

DHS: 21 states' voting systems probed by Russian hackers

In some cases the hackers got inside the systems, but their tampering had no connection to vote counts, according to a Department of Homeland Security official.

mobile malware (Morrowind/Shutterstock.com)

Explainer: How malware gets inside your apps

Malware can be inserted into applications by attackers who modify apps and republish them, by compromised in-app advertising or by corrupted development tools.

cybersecurity discussion

Experts hash out next-generation cyber defenses

A new collection of essays highlights effective cybersecurity defenses that can be leveraged by public-sector organizations.

website security (Rawpixel/Shutterstock.com)

Report: 60 percent of top federal websites fall short on security and privacy

The Online Trust Audit, which rates site security, consumer protection and privacy across several sectors, also noted federal sites' adoption of critical security best practices.

information sharing (Jirsak/Shutterstock.com)

Over classification stymies threat-info sharing

Better information sharing can help with cyber preparation, but over classification of data inhibits public-private partnerships, a security expert says.

hands typing on keyboard (By ESB Professional/Shutterstock.com)

Virginia Cyber Range serves up statewide hands-on education

An Amazon Web Services' cloud environment offers scalability and responsiveness to Virginia Tech's higher-ed partners, while minimizing costs.

cell phone encryption (Bakhtiar Zein/Shutterstock.com)

When is 'not a backdoor' just a backdoor? Australia's struggle with encryption

It's worth being skeptical of any mechanism aimed at accessing encrypted messages on platforms like WhatsApp.

identity protection (By Jirsak/Shutterstock.com)

Government’s role in protecting identity in an age of data breaches

We can’t go back to the old model of making people stand in line at government offices, but agencies must protect the identities of individuals requesting benefits and services.

botnet (By BeeBright/Shutterstock.com)

Commerce seeks ideas for battling botnets

The request for comment focuses on "ways to improve industry's ability to reduce threats ... and what role, if any, the U.S. Government should play."

Topic Resources

  • Security in the Cloud: Moving Beyond Compliance

    Creating a fully compliant cloud-based system is hard enough, but even that doesn’t go far enough to ensure security. As federal agencies are migrating to the cloud, some are learning best methods for creating a cloud-based security model they can trust...

  • Easing the Burden of Compliance

    Achieving and maintaining compliance continues to be a top priority for state and local governments. This is especially true when it comes to cybersecurity-related mandates. The processes for ensuring compliance remain a significant challenge because of new and evolving regulations and requirements. Agencies also struggle with reduced staff and budgets to ensure compliance. This eBook examines the current compliance landscape and how technologies like data encryption can help.

  • Using Software as a Service For Innovative Government

    As state and local government agencies continue their efforts to modernize and update their IT infrastructure to streamline operations, reduce costs, and deliver better citizen services, many are finding the Software as a Service (SaaS) model to be effective. Moving to a SaaS platform reduces the management burden on IT, improves access and scalability, reduces cost, and can actually increase security.


More from 1105 Public Sector Media Group