Cloud solutions can transform network security

Software-defined access control assesses trust of both users and devices and allows access to applications and services based on granular trust-based decisions.

Reimagining the TIC for a cloud environment

As agencies move to adopt cloud services, the Trusted Internet Connections architecture is becoming increasingly problematic.

lock, credit cards, keyboard (279photo Studio/Shutterstock.com)

Shoring up PCI compliance

Agencies that store, process or transmit credit or debit card data must comply with the Payment Card Industry Data Security Standard.

election security

DHS secretary reaffirms support for voting systems’ critical infrastructure designation

Evidence of Russian hacks on the election system has Department of Homeland Security Secretary John Kelly doubling down on his backing of the extra protection.

plumbers fixing leak (Macrovector/Shutterstock.com)

After a data spill: Containing and repairing the damage

Five tips to help agencies minimize the damage of an unintentional data spill.

ransomware (Nicescene/Shutterstock.com)

When it comes to ransomware, it’s sometimes best to pay up

Paying up may be the rational choice for some organizations, but given that cybercriminals go where the money is, the repercussions for others could be significant.

form asking for SSN (Ekaterina_Minaeva/Shutterstock.com)

Social Security numbers: a security risk with serious staying power

Despite the risk of fraud and identity theft posed by the use of Social Security numbers as identifiers, agencies continue to use them.

encrypted data in the cloud

Computing with encrypted data

Researchers are working on ways to optimize fully homomorphic encryption, which allows manipulation of encrypted data, for real-world applications.

investigation (alphaspirit/Shutterstock.com)

Cybercrime investigation: Where geek meet gumshoe

A new publication outlines a standard for investigating and preventing today’s complex and sophisticated cybercrime.

broken lock (By Sergey Nivens/Shutterstock.com)

US-CERT urges fast patch to Samba vulnerability

The newly announced flaw has lurked in the popular open-source software for years.

people voting in California

DEFCON to target voting machines

This summer’s hacker conference will give attendees a chance to apply their skills to manipulating voting machines.

facial recognition (Zapp2Photo/Shutterstock.com)

House committee looks into cities’ facial recognition tech

The House Committee on Oversight and Reform has sent letters to big-city mayors asking for documentation on their systems.

Topic Resources

  • Security in the Cloud: Moving Beyond Compliance

    Creating a fully compliant cloud-based system is hard enough, but even that doesn’t go far enough to ensure security. As federal agencies are migrating to the cloud, some are learning best methods for creating a cloud-based security model they can trust...

  • Easing the Burden of Compliance

    Achieving and maintaining compliance continues to be a top priority for state and local governments. This is especially true when it comes to cybersecurity-related mandates. The processes for ensuring compliance remain a significant challenge because of new and evolving regulations and requirements. Agencies also struggle with reduced staff and budgets to ensure compliance. This eBook examines the current compliance landscape and how technologies like data encryption can help.

  • Using Software as a Service For Innovative Government

    As state and local government agencies continue their efforts to modernize and update their IT infrastructure to streamline operations, reduce costs, and deliver better citizen services, many are finding the Software as a Service (SaaS) model to be effective. Moving to a SaaS platform reduces the management burden on IT, improves access and scalability, reduces cost, and can actually increase security.


More from 1105 Public Sector Media Group