secure file (Maksim Kabakou/

CUI compliance: The proxy approach

If controlled unclassified information can be consolidated onto an isolated, protected network, applying a single point proxy can accelerate and simplify compliance.

mobile phone user in NYC (Alessandro Colle/

New York secures its public Wi-Fi

NYC Secure will protect the city's public Wi-Fi networks with a DNS security service and offer a free city-sponsored smartphone app to alert users when suspicious activity is detected on their mobile devices.

California develops its own cybersecurity metrics

The California Cybersecurity Maturity Metrics are designed to help state agencies evaluate their risk postures through qualitative and quantitative measures.

government money (Florence-Joseph McGinn/

Elections commission announces security funding

For the first time in eight years, states are getting a financial infusion to improve their elections infrastructure ahead of the 2018 elections.

scanning a ballot (Lisa F. Young/

Trump-approved budget short on election security, counties say

The funding is certainly welcomed by local election officials, but many of them warn it falls far short of what they need to deal with security challenges ahead of the midterm elections in November.

tax form (negmardesign/

Indiana's risk-based strategy for tax fraud detection

With tax day less than three weeks away, the Indiana Department of Revenue is utilizing fraud analytics to detect anomalies in returns.

intrusion detection (sdecoret/

Protecting election registration sites from cyber intrusions

The Albert network monitoring solution provides automated alerts on both traditional and advanced network threats.

controlling chaos (rudall30/

Security through chaos engineering: No more 'set it and forget it'

Organizations that don’t stress test the security of their infrastructure, "are slowly drifting into the unknown," one security architect says.

secure connection (supimol kumying/

Limiting security risks in telecom equipment

The Federal Communications Commission is considering new rules that would effectively bar the use of telecommunications equipment from foreign suppliers who are deemed a threat to national security.

iphone fingerprint scanner (mama_mia/

Unlocking iPhones at $50 a pop

As mobile-phone encryption becomes more sophisticated, law enforcement agencies are looking to new low-cost tools for unlocking devices.

ransomware (posteriori/

Atlanta still hobbled by ransomware attack

Days after the announcement of a ransomware attack on Atlanta's city network, officials are still struggling to bring citizen-facing websites and internal application back online.


Moving IT security from human to machine speed

As agencies embrace machine learning-powered solutions, they’ll be able to better thwart threats, lighten the workload of security analysts and keep ahead of other nations.

Topic Resources

  • Security in the Cloud: Moving Beyond Compliance

    Creating a fully compliant cloud-based system is hard enough, but even that doesn’t go far enough to ensure security. As federal agencies are migrating to the cloud, some are learning best methods for creating a cloud-based security model they can trust...

  • PixelNet 2.0: The Pixel Perfect Platform

    On a large corporate campus for a major hardware manufacturer, the ability to display and manage audiovisual data is paramount. From real-time operations room video and security camera footage, to lobby signage, to streaming data and other A/V applications in conference rooms across multiple buildings, critical operations rely on accurate, real-time video data.

  • Accelerate and Maintain NIST 800-171 Compliance

    The Department of Defense (DoD) requires all contractors that process, store or transmit Controlled Unclassified Information (CUI) to have met the Defense Federal Acquisition Regulation Supplement (DFARS) minimum security standards by December 31, 2017 or risk losing their DoD contracts.3

  • Easing the Burden of Compliance

    Achieving and maintaining compliance continues to be a top priority for state and local governments. This is especially true when it comes to cybersecurity-related mandates. The processes for ensuring compliance remain a significant challenge because of new and evolving regulations and requirements. Agencies also struggle with reduced staff and budgets to ensure compliance. This eBook examines the current compliance landscape and how technologies like data encryption can help.

  • Using Software as a Service For Innovative Government

    As state and local government agencies continue their efforts to modernize and update their IT infrastructure to streamline operations, reduce costs, and deliver better citizen services, many are finding the Software as a Service (SaaS) model to be effective. Moving to a SaaS platform reduces the management burden on IT, improves access and scalability, reduces cost, and can actually increase security.

More from 1105 Public Sector Media Group