global IoT (Pasuwan/Shutterstock.com)

A call for global action on cyberattacks

The unprecedented security risks posed by artificial intelligence and machine learning demand an array of technological, legal and policy countermeasures, a new report says.

voting in california in 2012 (Joseph Sohm/Shutterstock.com)

Elections officials explore security options

Despite new financial support from Congress, local officials say they need more help securing their election systems ahead of the 2018 elections.

cybersecurity (vs148/Shutterstock.com)

NIST lays groundwork for encrypting IoT devices

The National Institute of Standards and Technology wants feedback on draft requirements for standardizing lightweight cryptography for internet-of-things devices.

People voting

Pennsylvania plots strategy for election security funds

The commonwealth directs all counties to have voter-verifiable paper record voting systems in place by the end of 2019.

malware

Evasive malware: A growing threat to state and local governments

Capable of transforming itself, evasive malware can persist and burrow deeper into networks and endpoints over long periods of time.

Russian cyberattacks

Russia targeting network infrastructure, US and UK officials warn

For more than a year, Russia-aligned cyber entities have been using a series of exploits to target millions of network devices.

homeless (Olga Pinegina/Shutterstock.com)

Blockchain-based identity for the homeless

Austin, Texas, is exploring how distributed-ledger technology can be used to help the homeless secure their personal records and access government resources.

The new cyber landscape

With tight budgets the only constant, agencies face a fast-evolving range of challenges -- from securing hybrid networks and authenticating users who connect via mobile devices and the cloud.

business meeting (marvent/Shutterstock.com)

10 best practices for bolstering security and increasing ROI

Justifying cybersecurity initiatives in terms of dollars and cents can be just as challenging as implementing them.

4 layers of enterprise security

Tools that verify traffic, isolate networks, prevent data loss and protect the endpoints are helping agencies lock down government data.

responders in new york (Christopher Penler/Shutterstock.com)

A digital wallet for first responder credentials

The Mobile Device and Attributes Validation app uses a digital wallet of "capsules," each holding a validated attribute or credential for first responders.

people voting (Gino Santa Maria/Shutterstock.com)

Election security means much more than just new voting machines

Securing electoral systems across the U.S. is a big problem with high stakes, so the federal money being provided to states must be used as efficiently as possible.

Topic Resources

  • Security in the Cloud: Moving Beyond Compliance

    Creating a fully compliant cloud-based system is hard enough, but even that doesn’t go far enough to ensure security. As federal agencies are migrating to the cloud, some are learning best methods for creating a cloud-based security model they can trust...

  • Case Study: City of Fayetteville

    What if you could find out what animals needed attention at the animal shelter, which sporting equipment was used most frequently in the city gym, which parking garage spaces were available most often, and when traffic was the busiest around city hall — all in a matter of minutes, from anywhere? Although this may sound futuristic, government organizations, like the city of Fayetteville, are already using technology to solve for these questions, and much more.

  • PixelNet 2.0: The Pixel Perfect Platform

    On a large corporate campus for a major hardware manufacturer, the ability to display and manage audiovisual data is paramount. From real-time operations room video and security camera footage, to lobby signage, to streaming data and other A/V applications in conference rooms across multiple buildings, critical operations rely on accurate, real-time video data.

  • Accelerate and Maintain NIST 800-171 Compliance

    The Department of Defense (DoD) requires all contractors that process, store or transmit Controlled Unclassified Information (CUI) to have met the Defense Federal Acquisition Regulation Supplement (DFARS) minimum security standards by December 31, 2017 or risk losing their DoD contracts.3

  • Easing the Burden of Compliance

    Achieving and maintaining compliance continues to be a top priority for state and local governments. This is especially true when it comes to cybersecurity-related mandates. The processes for ensuring compliance remain a significant challenge because of new and evolving regulations and requirements. Agencies also struggle with reduced staff and budgets to ensure compliance. This eBook examines the current compliance landscape and how technologies like data encryption can help.


More from 1105 Public Sector Media Group