Forward facing security by remembering the past

Forward-facing security by remembering the past

Looking forward to newer, smarter technologies is not always the most effective strategy for delivering an efficient, nimble and resilient security program. The best advice often is to properly implement the tools and technologies that have been available for years.

Idaho unwraps digital wallet

Idaho unwraps digital wallet

The Idaho Department of Agriculture is first agency to deploy the eGovExpress Digital Wallet that consolidates a user’s payment information into one password-protected online account.

Another VA headache: Privacy violations rising at veterans’ medical facilities

Another VA headache: Privacy violations rising at veterans’ medical facilities

Deceased vets’ data has been sent to the wrong widows. Employees have snooped on the records of patients who’ve committed suicide. And whistleblowers say their own medical privacy has been violated. In response, the VA says patient privacy is a priority.

Legacy voting machines ripe for tampering, breakdowns

Legacy voting machines ripe for tampering, breakdowns

As the nation prepares for the next presidential election, its voting machines are in need of a serious update.

DHS looks to smooth the path for tech startups

DHS looks to smooth the path for tech startups

The Department of Homeland Security’s new innovation framework aims to engage non-traditional government contractors, including start-up companies, for solutions to homeland security threats.

Don’t make a bad situation worse: Cybersecurity for emergency operations

Don’t make a bad situation worse: Cybersecurity for emergency operations

The controlled chaos of an emergency creates opportunities not only for accidental data exposure, but also for exploits of sensitive data and the resources that govern industrial control systems.

Data analytics, machine learning help find network threats

Data analytics, machine learning help find network threats

Enterprises can better protect themselves from cyberattacks if they combine automated network threat detection tools with traditional perimeter security methods, according to a new report from the SANS Institute.

NIST seeks comments on cybersecurity framework

NIST seeks comments on cybersecurity framework

The National Institute of Standards and Technology wants input regarding the implementation and potential improvements of its voluntary Framework for Improving Critical Infrastructure Cybersecurity.

National Guard cyber protection teams

National Guard expands cyber protection teams

A joint New York-New Jersey team was one of 13 new cyber units the Guard announced it would activate throughout 23 states by the end of fiscal year 2019.

data security and privacy

The unrealized potential of interagency total information sharing

Effective security solutions need to strike a balance between data sharing and privacy protection.

Cloud security

How does government cloud security stack up?

A new report identifies the biggest cloud cybersecurity concerns across eight industries.

White House responds to data encryption petition

White House responds to data encryption petition

In a response to a We the People petition on encryption, the White House said it would meet with petitioners and asked for additional public comments.

Topic Resources

  • GameChanger: Microsegmentation

    In less than a decade, more than 87 million records with sensitive or private information have been exposed due to cyber-incidents on federal networks alone. Increasingly, organizations are beginning to realize that perimeter-based security just isn’t enough anymore. Download to learn how for many data centers, the solution is microsegmentation.