Can biometrics be used to provide better citizen services?

Can authentication deliver better citizen services?

Security credentials could be based on a primary payment card, a mobile phone or a driver's license -- items users are unlikely to lose or misplace.

mobile authentication

Mobile devices: A better route to ID security

Advances in biometric authentication and smartphone technologies make the marriage of the two a strong platform for identity verification.

The 2016 GCN dig IT Awards: Make your nominations today!

The 2016 GCN dig IT Awards: Make your nominations today!

Celebrating discovery and innovation in government IT.

dangers of electromagnetic pulses to the electric grid

Is government prepared for the pulse?

Legislators are looking at how government can prepare for and respond to an electromagnetic pulse attack on the U.S. electrical grid.

Agencies struggle under burden of legacy IT

Agencies struggle under burden of legacy IT

As experts warn of the threats posed by outdated federal technology, lawmakers inch closer to backing a $3.1 billion fix-it fund.

Can the Postal Service put blockchain to work?

Can the Postal Service put blockchain to work?

A new report explores the potential ways the technology behind Bitcoin could help USPS reinvent its mission.

Coordination key to state cyber responses

Coordination key to state cyber responses

State officials tell Congress on how they are preparing for (and responding to) cyberattacks.

NAVAIR looking to address cyber resilience

NAVAIR wants to build cyber resiliency into weapons systems

Naval Air Systems Command issued a broad agency announcement for research to ensure weapon systems can survive and exploit cyber warfare.

The predictive analytics arms race

The predictive analytics arms race

Agencies are mining data to fight fraud, but the criminals may have better algorithms.

Security from the start: Using DevOps for secure collaboration

Security from the start: Using DevOps for secure collaboration

By including security in all aspects of development and operations processes, agencies can move from a reactive to a proactive security posture.

How to secure 911 systems

How to secure 911 systems

While the threats facing emergency response systems depend on what type of infrastructure jurisdictions possess, officials can take steps to protect their networks.

panel on managing IoT risk hosted by the Center for Strategic and International Studies

How can we manage IoT risk?

A recent panel focused on government’s role in managing the risks associated with the Internet of Things.


More from 1105 Public Sector Media Group