Baseline tailor

A better way to build on the NIST framework

Baseline Tailor makes it easier for users to reference the NIST cybersecurity framework to determine the security posture and then tailor a subset of the SP 800-53 security controls to make that desire a reality.

FEMA mobile derived PIV credential (FEMA)

Practical security for FEMA in the field

Federal Emergency Management Agency employees can now securely access work email, the intranet and other applications remotely by registering their mobile devices and receiving credentials derived from their FEMA-issued personal identity verification cards.

mobile phone user (Don Pablo/Shutterstock.com)

Real-time protection against malicious mobile traffic

APE was designed to monitor network traffic on smartphones and block any activity that isn’t playing by the rules, whether it comes from malware, viruses or a hacker.

cybersecurity (Rawpixel/Shutterstock.com)

NASCIO survey highlights IT consolidation, cybersecurity progress

NASCIO's latest annual survey outlines some of the challenges state IT officials face.

secure cloud fast development

IC collaboration, secure and at speed

Automated risk management and security compliance software scans the cloud environment for vulnerabilities and threats based on intelligence community standards, overlays, controls and audits.

tech leadership (Sergey Nivens/Shutterstock.com)

Leading by example on CDM

In 2017, DHS became the first federal agency to officially implement a CDM program, giving senior leaders had a dashboard that shows them what is on the network.

partnership for election security

Creating election security alliances

Collaborating with local IT officials and private industry has helped election officials in Denver and New York improve their election security.

Can blockchain bring interoperability to healthcare?

CDC eyes blockchain for exchanging health data during disasters

The Centers for Disease Control and Prevention is experimenting with the distributed ledger technology to monitor the spread of infectious diseases in crisis situations.

paper ballot

Russian hacking fuels return to paper ballots

Amid security concerns over Russian hackers targeting state voting systems in 2016, there's a renewed focus on shifting to analog solutions.

bank vault

Information security in government IT: Lessons learned from the financial industry

Enterprise cloud migration and over-the-cloud PII protection can be less challenging for agencies if they draw from the experiences of early adopters in the financial industry.

man with bluetooth ear piece

BlueBorne and wireless risk: Going beyond NIST and standard frameworks

Wireless security is rampant with undiscovered vulnerabilities and insecure protocols that have been paid scarce little attention despite some having been successfully exploited.

voting (Barbara Kalbfleisch/Shutterstock.com)

Attempted voting hacks a 'wake-up call,' former DHS chief says

The Russian probes and alleged attempted hacks of voting systems in the last election "exposed cyber vulnerabilities" that could have serious ramifications.

Topic Resources

  • Take Cybersecurity to the Next Level

    A top challenge for every government agency today is the effective management of cybersecurity risks. Protecting government information and citizens’ personal data has become more challenging as our networks and the amount of data on them has grown exponentially. In this Executive Insights, you’ll learn how a risk-based approach leveraging automation can provide a solid foundation to your agency’s cybersecurity posture.


More from 1105 Public Sector Media Group