security using artificial intelligence

Malware protection for air-gapped systems

Dell's Endpoint Security Suite Enterprise now features artificial intelligence and machine learning to identify threats at the end points, eliminating the need for signature-based solutions.

open doors to cloud (Sergey Nivens/

The move to cloud: It's easier than you think

Automated cloud compliance can simplify and streamline continuous monitoring.

Hartford, CT (mandritoiu/

Connecticut maps out cyber strategy

The state's goal is to reduce the likelihood and severity of large cyberattacks by strengthening the awareness and resilience of public and private entities.

ghost in the data center

Security specter still haunts cloud computing

Security for cloud services is improving, but some significant hurdles remain, security experts say.

federal blockchain

GSA ramps up blockchain exploration

The U.S. Federal Blockchain Forum will give stakeholders an opportunity to develop, share and discuss practical use cases for blockchain technology for agency missions.

nuclear power plant (vlastas/

Info sharing takes a hit in nuclear breach notification

Alerts of a recent spear-phishing attack may have damaged information sharing between government and critical infrastructure owners, experts say.

computer hack (MARCUSZ2527/

Gloomy cyber forecast from Black Hat

IT pros at the annual security conference expect a successful cyberattack on U.S. infrastructure in the next two years.

secure mobile medical data

Endpoint security: Keeping virtual desktops safe for the remote workforce

Advanced endpoint management lets agencies secure virtual applications and desktops while giving users access to the data and applications they need.

encryption concept (BeeBright/

IARPA explores easy-to-use cryptography

A new program will look at developing tools that architects and programmers can use without having to understand the nuances of specific cryptographic concepts.

Indiana IT

Indiana’s cybersecurity game plan

Indiana CIO Dewand Neely spoke with GCN about his cybersecurity strategy in the wake of recent ransomware attacks across the country.

worker typing (HAKINMHAN/

DIUx taps Plurilock for AI authentication

Defense officials are adding an additional layer of security to workplace computing through an artificial-intelligence system that monitors keystrokes and mouse behavior of individual users.

GCN dig IT awards

Deadline extended for 2017 dig IT award nominations

You have until July 15 to help GCN identify the innovative tech that's transforming government at all levels.

More from 1105 Public Sector Media Group