Federal BYOD: The mobile security conundrum

Federal BYOD: The mobile security conundrum

Although there are inherent risks to increasing the number of personal mobile devices connected to government networks, the benefits are too good to ignore.

DHS offers states help with voting systems security

DHS offers states help with voting systems security

Department of Homeland Security Secretary Jeh Johnson is conferring with state and local governments about the cybersecurity of voting systems.

DHS funds small biz cyber R&D

DHS funds small biz cyber R&D

Thirteen companies received $1.3 million in funding to develop new cybersecurity measures and technologies.

Enterprise mobile security tools may not protect BYOD

Enterprise mobile security tools may not protect BYOD

In a Black Hat presentation, a security consultant explained how existing EMS solutions could often be ineffective, even on standard, non-jailbroken personal devices.

IARPA looks to reinvent the virtual desktop

IARPA looks to reinvent the virtual desktop

The Intelligence Community's research agency is exploring the use of role-based virtual environments to enhance security.

Virginia offers scholarship for cybersecurity students

Virginia offers scholarship for cybersecurity students

Recipients of the Cybersecurity Public Service Scholarship Program must work for the state after graduation for the number of years that they received the scholarship.

threats inside the perimeter

Turning cybersecurity inside out

Rather than focus on attacks from the outside, organizations should concentrate on the internal networks, data and risks within their control.

From left: Allan Friedman (Director of Cybersecurity Initiatives), Edward Felten (Deputy U.S. Chief Technology Officer), Lorrie Cranor (Chief Technologist of FTC), Jonathan Mayer (Chief Technologist FCC) photo credit: Randy Apuzzo

DEF CON: How feds' outreach plays with the hacker crowd

The policyspeak of a DEF CON "Meet the Feds" panel put some hackers to sleep, but one attendee was glad to learn of the government’s work on IoT and software security.

Peiter "Mudge" Zatko and Sarah Zatko

A 'Consumer Reports' for software vulnerabilities

The Cyber Independent Testing Lab will evaluate the security of commercial software so that users and purchasers can make quantitative comparisons among different products.

How to prepare your network for the unexpected

How to prepare your network for the unexpected

For most agencies, a combination of security products create a formidable defense.

AI can address cybersecurity personnel shortage

AI can address cybersecurity personnel shortage

Because it’s not possible to scale up the cybersecurity talent pool fast enough to address escalating threats, artificial intelligence approaches to cybersecurity automation provide a highly desirable solution.

Government software in the cloud, now what?

Government software in the cloud, now what?

To make the cloud more secure, IT teams must adopt a proactive, real-time approach to protecting it, taking advantage of agile software development and better monitoring capabilities.

Topic Resources


More from 1105 Public Sector Media Group