bank vault

Information security in government IT: Lessons learned from the financial industry

Enterprise cloud migration and over-the-cloud PII protection can be less challenging for agencies if they draw from the experiences of early adopters in the financial industry.

man with bluetooth ear piece

BlueBorne and wireless risk: Going beyond NIST and standard frameworks

Wireless security is rampant with undiscovered vulnerabilities and insecure protocols that have been paid scarce little attention despite some having been successfully exploited.

voting (Barbara Kalbfleisch/Shutterstock.com)

Attempted voting hacks a 'wake-up call,' former DHS chief says

The Russian probes and alleged attempted hacks of voting systems in the last election "exposed cyber vulnerabilities" that could have serious ramifications.

Open source and the public sector

Policies promoting open-source software may make it more difficult for agencies to ensure their code is secure.

DHS to launch federal cyber dashboard next month

Jeanette Manfra said it will use data from sensor networks to help provide information to agencies on potential threats.

Making multifactor authentication work

Iris scanners, fingerprint readers and facial recognition can give agencies strong multifactor authentication that allows password-less login experiences that are more secure and easier for the user.

common access cards

On the hunt for a CAC replacement

Defense officials are making headway on identity management tools that can eventually replace the Common Access Card.

Identity search engine compares biometrics to watch lists

Identity protection is an overdue government mission

Governments across America now need a more robust approach to provide secure digital identities for their own operations and for the citizens they serve.

careless user error

Survey: Careless errors still pose biggest threat to agency networks

Careless or untrained insiders pose more security risks to federal agencies than threats from foreign governments, malicious insiders or terrorists, according to a new survey.

passwords (image by shutterstock.com)

Using truly secure passwords: 6 essential reads

From password managers, to biometrics to emoji- or gesture-based passwords, researchers are working on ways to make it easier to secure information.

woman with connected laptop and phone (SFIO CRACHO/Shutterstock.com)

On the verge of true federal IT modernization

By embracing cloud, biometrics and mobility, agencies can deliver the types of services citizens have come to expect from the private sector.

government cloud

When to purchase cloud security services

Using Gartner's cloud security hype cycle, agencies can determine when technologies are mature and stable enough for government use.

Topic Resources

  • Take Cybersecurity to the Next Level

    A top challenge for every government agency today is the effective management of cybersecurity risks. Protecting government information and citizens’ personal data has become more challenging as our networks and the amount of data on them has grown exponentially. In this Executive Insights, you’ll learn how a risk-based approach leveraging automation can provide a solid foundation to your agency’s cybersecurity posture.


More from 1105 Public Sector Media Group