phishing attack (wk1003mike/Shutterstock.com)

Business email compromise: Don’t catch that phish!

Safeguarding an agency against email compromise involves both administrative awareness and technical controls, such as email rules, filtering and third-party solutions.

secure supply chain

Insiders in the supply chain

An insecure IT supply chain can present as much risk to agencies as an insider exfiltrating data, according to security experts.

spyware

How Pegasus for Android was unmasked

Even with security researchers looking for an Android variant of the iOS spyware, the sophisticated program designed to surveil specific targets managed to hide itself.

data sharing (Vector Tradition SM/Shutterstock.com)

Why threat-data sharing is so hard

Agencies’ different interests in threat tracking, mitigation and prosecution can make it difficult for them to share information related to cyber attacks.

cyber health

Is it time for a U.S. (cyber) health service?

IT managers can improve data security by taking a page from how the health care community prevents, tracks down and resolves public health problems.

government cybersecurity (Bakhtiar Zein/Shutterstock.com)

Looking to the feds for help in fighting cybercriminals

The proposed State Cyber Resiliency Act would create a dedicated grant program to help states protect themselves against cybersecurity threats and better identify, detect, respond to and recover from attacks.

adversarial machine learning

Machines learning evolves, and hackers stand to gain

Automated systems that teach themselves can be manipulated by adversaries.

https (ktsdesign/Shutterstock.com)

Georgia gets serious about HTTPS

In an effort to make state government websites more secure, Georgia officials are switching to the encrypted website protocol platformwide.

digital identity (Blackboard/Shutterstock.com)

NIST extends comment period for digital identity guidelines

The deadline for feedback on a portion of SP 800-63-3 is now May 1.

password in encrypted data (Nomad_Soul/Shutterstock.com)

6 workarounds for accessing encrypted devices

A pair cybersecurity experts have published an essay that discusses the practical, technological and legal implications of encryption workarounds.

facial recognition technology

Facial recognition is increasingly common, but how does it work?

As facial recognition becomes more common in immigration and law enforcement applications, we must understand the issues of accuracy, privacy and ethics this new capability raises.

election security (Bakhtiar Zein/Shutterstock)

Questions, concerns continue to swirl around election security

The Department of Homeland Security is not seeking control of election-related critical infrastructure, but state and local election officials remain wary.

Topic Resources

  • Take Cybersecurity to the Next Level

    A top challenge for every government agency today is the effective management of cybersecurity risks. Protecting government information and citizens’ personal data has become more challenging as our networks and the amount of data on them has grown exponentially. In this Executive Insights, you’ll learn how a risk-based approach leveraging automation can provide a solid foundation to your agency’s cybersecurity posture.


More from 1105 Public Sector Media Group