2016 DIG IT winners

Discovery and innovation in government IT: The 2016 dig IT Award winners

DARPA, FEMA, NGA, Prince George's County, New Jersey's Parole Board and the Ark-Tex Council of Governments take top honors.

Deception for protection

Deception for protection

Using deception tools as cybersecurity measures can not only protect critical information, but also detect intrusions.

edward snowden By Laura Poitras / Praxis Films, Wikimedia Commons

'Snowden': A cinematic snow job?

When it comes to the recently released movie about the famed data-pilfering National Security Agency contractor, government insiders feel that director Oliver Stone and his team should get their dramatic license revoked.

Connecting classified and unclassified big data

Connecting classified and unclassified big data

DHS has created a data framework that makes it easier to search across classified and unclassified datasets.

Making sense of hackers

Making sense of hackers' actions after a breach

MITRE's ATT&CK model helps agencies understand and respond to the inevitable network penetrations.

Secure software is the best defense

Secure software is the best defense

The Fortify for Forge program gives the Defense Department’s Forge.mil users secure, rapid and cost-effective access to up-to-date software security assessment tools.

Hacking the Pentagon for patriotism and profit

Hacking the Pentagon for patriotism and profit

The Defense Digital Service proves that bug-bounty programs can pay big dividends for government agencies.

FEMA finds a better approach to systems security

FEMA finds a better approach to systems security

An aggressive push for improved authentication has resulted in savings, standardization and safer data.

Indiana CIO Dewand Neely

Applied analytics: What other states can learn from Indiana's wins (and missteps)

Indiana CIO Dewand Neely discusses his state's data analytics practice and its new approach to workforce cybersecurity training.

4 security management strategies for data center consolidation

4 security management strategies for data center consolidation

Organizational flexibility, encryption and automation will help network administrators better manage security as data centers shrink.

How LA corralled its security data

How LA corralled its security data

Los Angeles’ Integrated Security Operations Center consolidates all departmental cybersecurity into one central system.

18 states tap DHS for voting security help

18 states ask DHS for help securing voting systems

In response to the threat of foreign interference in U.S. elections, 18 states have asked the Department of Homeland Security for advice on how to protect voting technology from cyber tampering.

Topic Resources


More from 1105 Public Sector Media Group