desktop security issues Windows 10

Windows 10: Desktop management and security issues

The Windows 10 update frequency will require agencies to re-evaluate oversight and controls to prevent risk.

secure government communications

4 must-haves for secure communications

In the public sector, legacy infrastructure complicates any security decision.

Why government security belongs in the cloud

Why government security belongs in the cloud

Shifting security information and event management applications to the cloud gives IT managers the agility to proactively monitor, identify and respond to threats.

Cyber threats for energy, transportation sectors on the rise

Cyber threats for energy, transportation sectors on the rise

New targets are likely to emerge or expand, and the barrier to entry for threat actors is dropping.

Cyber Guard marshals resources from government, industry

Cyber Guard marshals resources from government, industry

Over 100 public and private sector organizations gathered to test response and coordination in the event of a cyberattack on the nation’s critical infrastructure.

2016 GCN DIG IT AWARDS

Recognizing the best in government IT

GCN dig IT Award nominations deadline has been extended to July 21!

State, local fusion center staff may get seats in NCCIC

State, local fusion center staff may get seats in NCCIC

A new bill would open DHS' National Cybersecurity and Communications Integration Center to state and local agencies to share cyberthreat info.

How to plan for after the hack

How to plan for after the hack

A draft NIST guide urges agencies to plan for recovery as well as prevention.

cybersecurity and fraud

Extending cybersecurity to fraud analytics

While there are some similarities between cybersecurity and fraud, traditional cybersecurity monitoring and analytics must evolve in order to identify the fraudulent use of IT systems that may otherwise go unnoticed.

Army network modernization

Army network modernization drives security, bandwidth improvements

Migrating to cloud architectures could help the Army improve security and bandwidth, according to some Army officials.

DOD to eliminate common access cards

DOD to eliminate common access cards

The Defense Department’s CIO announced a two-year plan to phase out CAC use on information systems.

Is it time to buy cyber insurance?

Is it time to buy cyber insurance?

Cybersecurity insurance not only helps agencies manage the costs of recovering from a breach, it can also foster better security practices.


More from 1105 Public Sector Media Group