4 steps for improving cyber preparedness

4 steps for improving cyber preparedness

Because state and local governments collect and store vast amounts of personal data, they are prime targets for cyberattacks.

Securing cyber-physical systems

Securing cyber-physical systems

Defense of cyber-physical systems requires multidisciplinary collaboration to address their inherent vulnerabilities.

Key to effective breach prevention: privileged user governance

Key to effective breach prevention: privileged user governance

Agencies must manage and monitor their privileged accounts and users with access to sensitive data.

The hackable election?

The hackable election?

According to a new report, a hack targeting only a few systems in a swing state could be enough to alter the outcome of a national race.

Facial recognition tech nabs ID fraudsters

Facial recognition tech nabs ID fraudsters

Since the New York Department of Motor Vehicles upgraded its technology in January, the agency has opened 900 new investigations and made 100 arrests.

Arizona and Illinois election systems targeted by foreign hackers

Arizona and Illinois election systems targeted by foreign hackers

The hack that took data on 200,000 registered voters in Illinois and another that penetrated an Arizona election system are suspected to have originated in Russia.

Announcing the Dig IT Award finalists

Learn more about the Dig IT finalists

The GCN Dig IT Awards celebrate discovery and innovation in government IT -- the cutting-edge technology and creative implementations that are supporting critical missions at all levels of the public sector.

Partnership aims for end-to-end security for Surface devices

Partnership aims for end-to-end security for Surface devices

Booz Allen Hamilton will be working with Microsoft to develop a single dockable product that workers can use like a desktop or or mobile device without losing any compute power or security.

Cyber exec: States should prep for ransomware attacks

Cyber exec: States should prep for ransomware attacks

As incidents of ransomware increase, states should eliminate easy targets and patch systems.

Securing voice in an IP environment

Securing voice in an IP environment

As agencies migrate their voice networks to internet-based platforms, session border controllers can provide additional security in unified communications.

Can endpoint security stop ransomware attacks?

Can endpoint security stop ransomware attacks?

Unlike antivirus protection, which only identifies specific signatures, advanced endpoint security provides real-time analysis of file movement and behavior across a whole network.

Dig IT Award Finalists:  Cybersecurity

Announcing the Dig IT Award Finalists: Cybersecurity

As the scope and sophistication of cyberattacks continue to grow, agencies are deploying ever more innovative defenses.

Topic Resources


More from 1105 Public Sector Media Group