Hacker (ShutterStock image)

8 things hackers would like you to know

A new report goes straight to the source for insights from the people trying to pull off the next big breach.

power grid inspection (ShutterStock image)

Cybersecurity of the power grid: A growing challenge

Research into grid security is moving toward systematically analyzing the risks inherent in critical systems and methodically defending against each of them.

states claim DHS probed election systems without permission

Two more states claim DHS probed election systems without permission

The Department of Homeland Security conducted unauthorized cyber scans of election systems in Indiana and Idaho, state officials said.

Thumbs down (shutterstock image)

States resist ‘critical infrastructure’ designation for election systems

A group of state officials formally opposed the move by DHS to protect their systems through a critical infrastructure designation.

Technology enabled city (ShutterStock image)

IT, networking, smart lighting buys booming in state and local market

Cross-disciplinary IT services, connectivity and smart lighting are among the top 10 growth areas in government contracting, according to a new market research report.

How DHS hopes to harden tech against GPS spoofing (ShutterStock image)

How DHS hopes to harden tech against GPS spoofing

The Department of Homeland Security is inviting manufacturers of commercial GPS receivers used in critical infrastructure to test their equipment in a live-sky spoofing environment.

Decision makers: Get your war game on (ShutterStock image)

Decision makers: Get your war game on

With today’s war games, teams with competing interests get a chance to practice the coordination and collaboration they need to meet changes with effective response.

Report: Cities leaving their cyber assets exposed (ShutterStock image)

Report: Cities leaving their cyber assets exposed

Analysis of scans of internet-connected devices show unsecured connected assets across government and other sectors supporting critical infrastructure.

Locking down voting tech (ShutterStock image)

Locking down voting tech

State election officials are making plans to tighten security all along the voting chain -- from voter registration to machine integrity and audit trails -- with help from the Department of Homeland Security under the new critical infrastructure designation.

Today’s ransomware could become tomorrow’s security nightmare (ShutterStock image)

Today’s ransomware could become tomorrow’s security nightmare

Any weak link breached by ransom-seeking hackers can also be exploited by bad actors with more malicious goals.

A cautionary tale of IT and OT dependencies

A cautionary tale of IT and OT dependencies

An inspector general’s report identified problems at NASA that are no doubt familiar to IT managers at large organizations working keep IT and operational technology systems secure.

Self-destructing messages won’t fly in government

Self-destructing messages won’t fly in government

If Trump administration staff members are using an app that deletes messages after they are read, they may be in violation of records preservation rules.

Topic Resources

  • Take Cybersecurity to the Next Level

    A top challenge for every government agency today is the effective management of cybersecurity risks. Protecting government information and citizens’ personal data has become more challenging as our networks and the amount of data on them has grown exponentially. In this Executive Insights, you’ll learn how a risk-based approach leveraging automation can provide a solid foundation to your agency’s cybersecurity posture.


More from 1105 Public Sector Media Group