cybersecurity discussion

Experts hash out next-generation cyber defenses

A new collection of essays highlights effective cybersecurity defenses that can be leveraged by public-sector organizations.

website security (Rawpixel/Shutterstock.com)

Report: 60 percent of top federal websites fall short on security and privacy

The Online Trust Audit, which rates site security, consumer protection and privacy across several sectors, also noted federal sites' adoption of critical security best practices.

information sharing (Jirsak/Shutterstock.com)

Over classification stymies threat-info sharing

Better information sharing can help with cyber preparation, but over classification of data inhibits public-private partnerships, a security expert says.

hands typing on keyboard (By ESB Professional/Shutterstock.com)

Virginia Cyber Range serves up statewide hands-on education

An Amazon Web Services' cloud environment offers scalability and responsiveness to Virginia Tech's higher-ed partners, while minimizing costs.

cell phone encryption (Bakhtiar Zein/Shutterstock.com)

When is 'not a backdoor' just a backdoor? Australia's struggle with encryption

It's worth being skeptical of any mechanism aimed at accessing encrypted messages on platforms like WhatsApp.

identity protection (By Jirsak/Shutterstock.com)

Government’s role in protecting identity in an age of data breaches

We can’t go back to the old model of making people stand in line at government offices, but agencies must protect the identities of individuals requesting benefits and services.

botnet (By BeeBright/Shutterstock.com)

Commerce seeks ideas for battling botnets

The request for comment focuses on "ways to improve industry's ability to reduce threats ... and what role, if any, the U.S. Government should play."

Stalking the insider threat

Protection from insider threats

Privileged account management is critical in keeping agency networks secure.

Cloud solutions can transform network security

Software-defined access control assesses trust of both users and devices and allows access to applications and services based on granular trust-based decisions.

Reimagining the TIC for a cloud environment

As agencies move to adopt cloud services, the Trusted Internet Connections architecture is becoming increasingly problematic.

lock, credit cards, keyboard (279photo Studio/Shutterstock.com)

Shoring up PCI compliance

Agencies that store, process or transmit credit or debit card data must comply with the Payment Card Industry Data Security Standard.

18 states tap DHS for voting security help

DHS secretary reaffirms support for voting systems’ critical infrastructure designation

Evidence of Russian hacks on the election system has Department of Homeland Security Secretary John Kelly doubling down on his backing of the extra protection.

Topic Resources

  • Take Cybersecurity to the Next Level

    A top challenge for every government agency today is the effective management of cybersecurity risks. Protecting government information and citizens’ personal data has become more challenging as our networks and the amount of data on them has grown exponentially. In this Executive Insights, you’ll learn how a risk-based approach leveraging automation can provide a solid foundation to your agency’s cybersecurity posture.


More from 1105 Public Sector Media Group