identity management (Vectomart/Shutterstock.com)

In the cyber evolution, identity and access management is a key player

By going beyond the basics of IAM, agencies can maintain the level of security that is necessary to protect mission-critical data, without burdening the end user.

DOD bug bounty programs pay off

DOD bug bounty programs pay off

The Pentagon’s Hack the Pentagon pilot found more bugs faster, for a fraction of the cost of commercial penetration testing, a DOD digital service expert said.

cybersecurity (vs148/Shutterstock.com)

NIST’s cybersecurity framework is changing -- what you should know

Although the framework sets up a solid foundation for cybersecurity, it is just a starting point, not the end of the road.

network security (Shutterstock.com)

It’s time to repeal and replace network access control

Software-defined perimeter technology offers a more secure, efficient and cost-effective solution for enterprise network security.

officer with radio (John Roman Images/ShutterStock.com)

DHS adds encryption requirements to responder radio equipment

The change will help ensure that responders from different jurisdictions using equipment from different manufacturers can communicate securely and successfully.

security services (Mikko Lemola/ShutterStock.com)

Making CDM more accessible to state and local governments

The General Services Administration acknowledges that purchasing the monitoring and security services has been harder than it has to be.

Austin Texas 911 center (atxn.tv/YouTube)

Attacks, crashes underscore need for new 911 systems

Recent disruptions in legacy 911 emergency-response systems point up the urgent need for new technology, but few states or localities can afford the upgrades.

chipped key

The age of hacking brings a return to the physical key

Combining a password management program with a chipped Universal Second Factor key can create very strong passwords that users don’t need to memorize.

cloud security (Shutterstock.com)

NGA looks to ‘reinvent security’ with fast-churn cloud architecture

The National Geospatial-Intelligence Agency wants the flexibility to tear down its cloud architecture and rebuild it every day so that would-be attackers confront a confusing operating environment.

facial recognition (Montri Nipitvittaya/Shutterstock.com)

House seeks clarity on FBI facial recognition database

Members of the House Committee on Oversight and Government Reform questioned the FBI over its use of facial recognition technology.

cloud-based security (Omelchenko/Shutterstock.com)

7 reasons why cloud-based security makes sense

Moving the point of mitigation from the data center to the cloud platform offloads the responsibility from an agency’s IT staff to that of the cloud provider and offers several other advantages.

blockchain as a service

IBM launches blockchain as a service

Based on the IBM Cloud, the new service gives enterprises a way to experiment with the distributed ledger technology.

Topic Resources

  • Take Cybersecurity to the Next Level

    A top challenge for every government agency today is the effective management of cybersecurity risks. Protecting government information and citizens’ personal data has become more challenging as our networks and the amount of data on them has grown exponentially. In this Executive Insights, you’ll learn how a risk-based approach leveraging automation can provide a solid foundation to your agency’s cybersecurity posture.


More from 1105 Public Sector Media Group