TARDEC autonomous vehicle (Isiah Davenport)

Defending military vehicles against cyberattacks

The Army is scouting for an intrusion defense system for military ground vehicles that will protect against cyberattacks.

social media tools on phone (Vasin Lee/Shutterstock.com)

Should government social media accounts be treated as critical infrastructure?

Social media accounts used for timely or sensitive communications should be subject to the same cybersecurity practices followed by the energy, transportation and chemical sectors.

election security (Shutterstock.com)

Best practices for election systems security

A new handbook from the Center for Internet Security details ways jurisdictions can improve the security of their digital elections systems.

voting scrutiny (Bakhtiar Zein/Shutterstock.com)

Is your county elections clerk ready for Russian hackers?

In a decentralized election system with more than 10,000 separate jurisdictions, the onus for security is on local officials.

lock on a chip (shutterstock.com image)

Can IoT transmissions be securely encrypted?

MIT researchers have developed a tiny, low-power chip that is hard-wired to perform public-key encryption.

people voting (Gino Santa Maria/Shutterstock.com)

Despite security concerns, states haven't upgraded voting tech

Although election security has received significant attention following the 2016 presidential election, a new report finds that little has changed since 2015.

Recent data breaches spark debate over 'reasonable' notification rules

States are trying to beef up consumer protections by clearly defining how quickly residents must be notified of a data breach and broadening the category of "personal information" covered under such laws.

Blockchain (a-image/Shutterstock.com)

Using blockchain to secure the 'internet of things'

Blockchain-based systems that check in for updates would help all IoT manufacturers secure their devices.

responder

Is FirstNet secure enough for law enforcement?

Although California eventually decided to opt into the FirstNet national public-safety wireless broadband network, it raised concerns about the network's compliance with Criminal Justice Information Services requirements.

data breach (Kunst Bilder/Shutterstock.com)

How agencies should respond to shorter breach reporting statutes

As the increasing number of breaches collide with tighter reporting mandates, agencies must strike a balance between protecting citizens and taking the time required to conduct a meticulous forensic investigation.

screen grab from haveibeenpwned.com

Has .gov been pwned?

The Australian and UK governments now have centralized access to Have I Been Pwned, a service that will let them monitor whether their domains' email addresses have been compromised.

Internet of Battlefield Things

Developing and protecting the internet of battlefield things

The Army Research Lab is exploring technology that enhances collaboration between autonomous agents and human warriors on the battlefield.

Topic Resources

  • Security in the Cloud: Moving Beyond Compliance

    Creating a fully compliant cloud-based system is hard enough, but even that doesn’t go far enough to ensure security. As federal agencies are migrating to the cloud, some are learning best methods for creating a cloud-based security model they can trust...

  • Easing the Burden of Compliance

    Achieving and maintaining compliance continues to be a top priority for state and local governments. This is especially true when it comes to cybersecurity-related mandates. The processes for ensuring compliance remain a significant challenge because of new and evolving regulations and requirements. Agencies also struggle with reduced staff and budgets to ensure compliance. This eBook examines the current compliance landscape and how technologies like data encryption can help.

  • Using Software as a Service For Innovative Government

    As state and local government agencies continue their efforts to modernize and update their IT infrastructure to streamline operations, reduce costs, and deliver better citizen services, many are finding the Software as a Service (SaaS) model to be effective. Moving to a SaaS platform reduces the management burden on IT, improves access and scalability, reduces cost, and can actually increase security.


More from 1105 Public Sector Media Group