Election systems get ‘critical infrastructure’ designation

Election systems get ‘critical infrastructure’ designation

DHS Secretary Jeh Johnson formally designated state election assets -- including polling places, centralized vote tabulation locations, storage facilities and related information and communications technology -- as U.S. critical infrastructure.

‘Hacktivists’ increasingly target local and state government computers

‘Hacktivists’ increasingly target local and state government computers

State and local agencies must be able to defend against politically motivated attacks that can take websites offline, expose personal information or even knock out utility service.

FTC hacked drones in privacy demo

FTC hacked drones in privacy demo

In a demonstration of security vulnerabilities in popular products, Federal Trade Commission researchers hacked into and took control of consumer-grade drones.

FedRAMP  issues ‘high’ approval for AWS services

FedRAMP issues ‘high’ approval for AWS services

The high baseline approval will allow Amazon Web Services to handle and store data that, if compromised, could severely hurt organizational operations, assets or people.

Security still key concern for agencies moving to the cloud

Security still key concern for agencies moving to the cloud

Cloud providers haven't managed to completely persuade the government IT community that they can provide the necessary controls to ensure security and prove regulatory compliance.

National Guard cyber protection

National Guard expects expanded role in cybersecurity

As cyber threats continue to multiply, states can look to the National Guard for help.

Nearly one-third of federal websites haven’t converted to HTTPS

Nearly one-third of federal websites haven’t converted to HTTPS

Although federal agencies were to transition their websites to the more-secure HTTPS communications protocol by Dec. 31, some conversions remain a work in progress.

Attackers can make it impossible to dial 911

Attackers can make it impossible to dial 911

If we are to prevent denial of service attacks on 911 systems, we must understand where the weaknesses lie, both in technology and policy.

NIST finalizes cyberattack recovery guidance

NIST finalizes cyberattack recovery guidance

New guidance provides tactical and strategic advice for cyber event recovery planning.

IoT broadens smart cities attack surface

IoT broadens attack surface of smart cities

As smart cities start investing in connected devices, there is arguably a much broader threat vector from botnets taking advantage of the unsecured Internet of Things.

NIST quantum encryption

NIST looks for defense against code-cracking quantum machines

Pulling together quantum-resistant cryptography will take time, and NIST feels that, unless it starts now, that new cryptography won’t be ready.

State and local IT spending to grow in 2017

State and local IT spending to grow in 2017

The steady growth in state and local government IT spending will continue, as agencies look to replace legacy systems and protect against cyber threats, a recent report says.

Topic Resources

  • Take Cybersecurity to the Next Level

    A top challenge for every government agency today is the effective management of cybersecurity risks. Protecting government information and citizens’ personal data has become more challenging as our networks and the amount of data on them has grown exponentially. In this Executive Insights, you’ll learn how a risk-based approach leveraging automation can provide a solid foundation to your agency’s cybersecurity posture.


More from 1105 Public Sector Media Group