two-factor authentication (Inspiring/Shutterstock.com)

Social Security revises two-factor authentication for user accounts

Starting June 10, owners of My Social Security accounts must use a one-time code -- sent to an email address or cell phone -- to access their accounts.

An F/A-18F Super Hornet from Strike Fighter Squadron (VFA) 122 launches off the aircraft carrier USS Carl Vinson (U.S. Navy photo by Mass Communication Specialist Seaman Jacob G. Kaucher/Released)

DOD believes blockchain can boost 3-D printing at the front

An encrypted and distributed ledger system could help solve intellectual property concerns that complicate efforts to produce parts on the fly.

identity in the cloud (Blue Island/Shutterstock.com)

Okta identity service gets FedRAMP approval

The identity management platform received FedRAMP moderate authorization.

airport check in (Africa Studio/Shutterstock.com)

DHS officials push digital, biometrics for efficiency

DHS officials expect the Investigative Case Management system to handle immigration enforcement by the end of this year.

workers (nd3000/Shutterstock.com)

Serving the country without wearing the uniform

A robust education-, training- and experience-based strategy for building a cybersecurity workforce will allow us to defend our critical infrastructures and digital resources.

multifactor authentication

Making multifactor authentication a reality

Modern, standards-compliant, multifactor authentication is one of the most effective ways organizations can reduce cyber risk, a new report says.

cloud-based security (Omelchenko/Shutterstock.com)

AWS expands DOD IL4, authentication services

More than a dozen cloud service applications are now available under DISA Impact Level 4 for the Amazon Web Services GovCloud.

IoT security (BeeBright/Shutterstock.com)

Keeping the IoT safe

Authentication will become more critical, and difficult, as the internet of things expands, Vint Cerf asserts.

e-signatures

How cloud-based e-signatures smooth workflow

Besides speeding approvals and enhancing security, e-signatures provide visibility into government processes.

global security (welcomia/Shutterstock.com)

Cyberattacks on governments double

To hackers, government targets may be just as attractive as banks, a new report suggests.

mobile devices (Bartolomiej Pietrzyk/Shutterstock.com)

Can government secure the mobile ecosystem?

Mobile devices pose a special risk to government, in part because commercial carriers aren't subject to the security controls that can be applied to federal networks, a new DHS report says.

cloud security (everything possible/Shutterstock.com)

How to implement enterprise-to-cloud security

Placed between cloud service providers and users, cloud access security broker solutions enforce an enterprise’s security policies.

Topic Resources

  • Take Cybersecurity to the Next Level

    A top challenge for every government agency today is the effective management of cybersecurity risks. Protecting government information and citizens’ personal data has become more challenging as our networks and the amount of data on them has grown exponentially. In this Executive Insights, you’ll learn how a risk-based approach leveraging automation can provide a solid foundation to your agency’s cybersecurity posture.


More from 1105 Public Sector Media Group