Quantum computing: Probable solutions incredibly fast

Quantum-based random numbers to go

The Q-RAND random-number generator takes advantage of the unpredictable behavior of subatomic particles and can be inexpensively embedded in electronic devices like USB sticks.

botnet (BeeBright/Shutterstock.com)

Anatomy of a bot campaign

A new report digs into the behavior and strategies that guide botnet-directed campaigns.

Protecting the power grid from GPS spoofing

Researchers have developed an algorithm that can detect and correct anomalous GPS timing signals.

voting (vchal/Shutterstock.com)

California creates elections security office

The Office of Elections Cybersecurity is dedicated to limiting incidents that could interfere with the security or integrity of elections in the state.

cybersecurity (vs148/Shutterstock.com)

CDM moves to mobile

The Department of Homeland Security is working to expand the Continuous Diagnostics and Mitigation program to mobile devices.

atlantic ocean from space (Shutterstock.com)

Improving information sharing across the Atlantic

Agreement on data handling practices combined with advanced technologies can create a trusted threat intel sharing environment between the U.S. and its European allies.

cybersecure new york city

Building NYC’s secure cyber future

Resources, technology and partnerships have helped New York City battle cybercrime and enhance digital protections.

Shutterstock ID ID: 222190471 By wk1003mike

SaaS adoption is on the rise, but so is data loss

With user error the largest risk factor, agency IT teams should leverage automated backup and restoration technology to guarantee the security and accessibility of cloud data.

software development (REDPIXEL.PL/Shutterstock.com)

Getting to a development process that is both faster and more secure

Dynamic, role-based SSH certificates can eliminate security burdens from DevOps and contribute to a more efficient and secure network that serves all users.


Election-system sensor deployment continues ahead of midterms

There are now 87 Albert sensors actively supporting election infrastructure at the state and county levels.

Friedman Black Hat presentation (Allan Friedman)

Assembling an ingredients list for software

The Commerce Department's "software bill of materials" initiative could give IT managers a better sense of what is in their enterprise software.

LinkNWK kiosk (Intersection)

New ways to secure public Wi-Fi

The maker of LinkNYC and LinkNWK Wi-Fi kiosks are rolling out an app to encrypt communications between the hotspots and user devices.

Topic Resources

  • Threats, Fraud and Identity Theft: Keeping Credentials Safe and Secure

    Conversations about identity security cover a broad range of topics, from the physical credentials in use today to the next generation of digital identities. Protecting against threats to identity security requires collaboration from multiple jurisdictions and security experts. In this webinar, we will look at fraudsters’ attempts to replicate or tamper with driver’s licenses and state issued IDs – both in the physical format and as digital IDs. We will outline best practices for managing digital credentials and provide a roadmap for future planning.

More from 1105 Public Sector Media Group