power plant (ETAJOE/Shutterstock.com)

As Russians hack the US grid, a look at what’s needed to protect it

As sophisticated attackers may find and exploit currently unknown vulnerabilities, it’s important for electric utilities, grid operators and vendors to remain vigilant and deploy multiple layers of defense.

How local governments can better protect their data and applications

Software-defined, zero-trust access can lighten the load of an understaffed, underequipped government security team.

facial recognition technology (Shutterstock.com)

Why confidence matters in facial recognition systems

Concerns over the accuracy of facial recognition systems came under the spotlight when Amazon’s Rekognition incorrectly matched 28 members of Congress to criminal mugshots.

People in a meeting showing importance of communication

Bridging federal IT’s knowledge gap

Continual communication about strategy and goals along with frequent training will help IT staff understand their agency's primary objectives and how best to meet them.

IT firefighting

How to stop the cyber-threat firefighting

Using network segmentation in a zero-trust model gives agency networks the best chance of avoiding a breach and staying invisible to malicious attackers.

voting (Barbara Kalbfleisch/Shutterstock.com)

Congress blocks election security funds for states, again

Although Senate Democrats tried to add funding for states and localities to upgrade the security of their election systems, the measure was defeated.

typewriter and old papers (PongMoji/Shutterstock.com)

Ransomware calls for desperate measures – even typewriters

A south-central borough in Alaska is the latest government to fall victim to far-reaching ransomware.


Better solutions for ransomware recovery

With the versioning and write-once, read-many features of object storage, agencies can limit the impact of ransomware when preventative measures fail.

hacker looking at screen

How Russian hackers attack (and how to defend against it)

As the threat of Russian hacking continues to loom, DHS is educating critical infrastructure stakeholders on the latest tactics and how to test systems for leaks and loopholes.

shutterstock ID: 295517744 By David Carillet

Weaponized information seeks a new target in cyberspace: Users’ minds

The Russian attacks on the 2016 U.S. presidential election happened across all three dimensions of cyberspace -- physical, informational and cognitive.

With hacking of US utilities, Russia could move from cyber espionage toward cyber war

The distinction between exploiting weaknesses to gather information and using those vulnerabilities to actually do damage is impossibly thin.

cloud and city (Shaynepplstockphoto/Shutterstock.com)

Digital transformation that keeps vulnerabilities at bay

Robust online government services make security a top consideration for municipalities, which must ensure that valuable information doesn’t fall into the wrong hands.

Topic Resources

  • Threats, Fraud and Identity Theft: Keeping Credentials Safe and Secure

    Conversations about identity security cover a broad range of topics, from the physical credentials in use today to the next generation of digital identities. Protecting against threats to identity security requires collaboration from multiple jurisdictions and security experts. In this webinar, we will look at fraudsters’ attempts to replicate or tamper with driver’s licenses and state issued IDs – both in the physical format and as digital IDs. We will outline best practices for managing digital credentials and provide a roadmap for future planning.

  • Security in the Cloud: Moving Beyond Compliance

    Creating a fully compliant cloud-based system is hard enough, but even that doesn’t go far enough to ensure security. As federal agencies are migrating to the cloud, some are learning best methods for creating a cloud-based security model they can trust...

  • IT Consolidation: What's Next for Government Modernization Initiatives?

    IT consolidation has been a high-priority federal initiative for years. While the value is clear, it’s critical for federal IT pros to understand a key piece of the equation: to realize the full value, agencies must also consolidate their ITOM tools.

More from 1105 Public Sector Media Group