data breach (LeoWolfert/Shutterstock.com)

Alabama governor signs data breach notification law

With the new measure requiring residents be informed with 45 days of a data breach, Alabama becomes the 50th state to enact a consumer data breach notification law.

Power plant

Competing to defend the energy grid

The Department of Energy is holding a competition requiring participants to build and defend a grid against adversaries.

secure file (Maksim Kabakou/Shutterstock.com)

CUI compliance: The proxy approach

If controlled unclassified information can be consolidated onto an isolated, protected network, applying a single point proxy can accelerate and simplify compliance.

mobile phone user in NYC (Alessandro Colle/Shutterstock.com)

New York secures its public Wi-Fi

NYC Secure will protect the city's public Wi-Fi networks with a DNS security service and offer a free city-sponsored smartphone app to alert users when suspicious activity is detected on their mobile devices.

California develops its own cybersecurity metrics

The California Cybersecurity Maturity Metrics are designed to help state agencies evaluate their risk postures through qualitative and quantitative measures.

government money (Florence-Joseph McGinn/Shutterstock.com)

Elections commission announces security funding

For the first time in eight years, states are getting a financial infusion to improve their elections infrastructure ahead of the 2018 elections.

scanning a ballot (Lisa F. Young/Shutterstock.com)

Trump-approved budget short on election security, counties say

The funding is certainly welcomed by local election officials, but many of them warn it falls far short of what they need to deal with security challenges ahead of the midterm elections in November.

tax form (negmardesign/Shutterstock.com)

Indiana's risk-based strategy for tax fraud detection

With tax day less than three weeks away, the Indiana Department of Revenue is utilizing fraud analytics to detect anomalies in returns.

intrusion detection (sdecoret/Shutterstock.com)

Protecting election registration sites from cyber intrusions

The Albert network monitoring solution provides automated alerts on both traditional and advanced network threats.

controlling chaos (rudall30/Shutterstock.com)

Security through chaos engineering: No more 'set it and forget it'

Organizations that don’t stress test the security of their infrastructure, "are slowly drifting into the unknown," one security architect says.

secure connection (supimol kumying/Shutterstock.com)

Limiting security risks in telecom equipment

The Federal Communications Commission is considering new rules that would effectively bar the use of telecommunications equipment from foreign suppliers who are deemed a threat to national security.

iphone fingerprint scanner (mama_mia/Shutterstock.com)

Unlocking iPhones at $50 a pop

As mobile-phone encryption becomes more sophisticated, law enforcement agencies are looking to new low-cost tools for unlocking devices.

Topic Resources

  • Security in the Cloud: Moving Beyond Compliance

    Creating a fully compliant cloud-based system is hard enough, but even that doesn’t go far enough to ensure security. As federal agencies are migrating to the cloud, some are learning best methods for creating a cloud-based security model they can trust...

  • Easing the Burden of Compliance

    Achieving and maintaining compliance continues to be a top priority for state and local governments. This is especially true when it comes to cybersecurity-related mandates. The processes for ensuring compliance remain a significant challenge because of new and evolving regulations and requirements. Agencies also struggle with reduced staff and budgets to ensure compliance. This eBook examines the current compliance landscape and how technologies like data encryption can help.

  • Using Software as a Service For Innovative Government

    As state and local government agencies continue their efforts to modernize and update their IT infrastructure to streamline operations, reduce costs, and deliver better citizen services, many are finding the Software as a Service (SaaS) model to be effective. Moving to a SaaS platform reduces the management burden on IT, improves access and scalability, reduces cost, and can actually increase security.


More from 1105 Public Sector Media Group