How blockchain will transform our cities

How blockchain will transform our cities

The blockchain can become the city’s operating system, invisible yet ubiquitous, improving citizens’ access to services, goods and economic opportunities.

risk-based data protection

Implementing a best practice approach to risk-based data protection

A standardized and repeatable process for the IT department and the program managers allows for advice, guidance and review of security and privacy at every step of the process.

Cybersecurity’s next phase: Cyber deterrence

Cybersecurity’s next phase: Cyber deterrence

We can strengthen cyber deterrence by improving cybersecurity, employing active defenses and establishing international norms for cyberspace.

Enterprise Linux 7.1 meets NIST crypto standards

Enterprise Linux 7.1 meets NIST crypto standards

Red Hat's platform is FIPS 140-2-certified for nine of its modules, making it a secure, open-source operating system.

3 ways to strengthen security with software supply-chain automation

3 ways to strengthen security with software supply-chain automation

Automation can give developers confidence in open-source components’ security, licensing and quality.

Greater than a wall: Building border security technology

Greater than a wall: Building border security technology

Biometric data capture, ID verification and algorithmic intelligence technologies will enhance the coverage, responsiveness and flexibility of border protection efforts.

Client-side encryption enables Gmail for state users

Client-side encryption enables Gmail for state users

Maryland used Virtru Pro to ensure email is encrypted before it’s sent, making it compliant with requirements of the Health Insurance Portability and Accountability Act and Criminal Justice Information Services.

Biometric authentication growing for mobile devices, but security needs work

Biometric authentication growing for mobile devices, but security needs work

Hacks of phone-based fingerprint readers and facial recognition software underscore the need for multifactor identification.

How to address the 6 most overlooked causes of data breaches

How to address the 6 most overlooked causes of data breaches

By addressing weaknesses in human factors, agencies can reduce their attack surface and make every employee a soldier in the battle against cyberattacks.

Open IT, security key to smart city future

Open IT, security key to smart city future

Cities are looking for open and secure solutions to help enable smart city development, according to a new report from IDC.

Panel issues cybersecurity call to arms

Presidential panel issues cybersecurity call to arms

To highlight the nation's biggest and most urgent cybersecurity issues, a new 100-page report calls for an all-hands-on-deck approach to addressing cyber risks.

6 cyber predictions for 2017

6 cyber predictions for 2017

McAfee’s annual report on the cybersecurity landscape holds some tips for government IT managers.


More from 1105 Public Sector Media Group