Eye-dentify imposter detection software (DHS)

Eye-tracking tech helps CBP detect imposters

Eye-dentify tracks trainees’ eye movements during imposter detection training so instructors can provide immediate feedback on agents' performance.

businessman with smartphone (TATSIANAMA/Shutterstock.com)

NSA approves virtualization-secured smartphone

The HTC One A9 Android smartphone running the Cog Systems D4 Secure Platform has been added to the National Security Agency’s Commercial Solutions for Classified list.

cybersecurity and fraud

Michigan plans cyber analytics center

The Cyber Threat Analytics Center will use feedback from network sensors, commercially available threat feeds and physical threat modeling to prepare for cyberattacks.

Virginia mobile driver

Virginia pilots mobile driver’s license

Tests of digital driver’s licenses show the potential of the technology, the leader of Virginia’s pilot program says.

Maxwell Air Force Base (USDA/Wikimedia Commons)

Air Force tests wireless smart perimeter

Under an agreement between the Air Force and AT&T, Maxwell Air Force Base is testing a sensor network and facial recognition technology to improve base security.

Locked Shields 2017 (NATO’s Cooperative Cyber Defense Centre of Excellence)

Cyber defenders hone skills in international wargame

For Locked Shields 2017, 800 participants from 25 nations defended a fictional military air base in the face of attacks on its electric power grid, drones, military command and control systems and other operational infrastructure.

spreading cyber attack (fotogestoeber/Shutterstock.com)

Cyber attacks 10 years on: from disruption to disinformation

Since the cyber attack on Estonia in 2007, internet-based incursions have escalated massively, but their targets have become more diffuse, indicating future attacks may target information and opinion.

security (ranjith ravindran/Shutterstock.com)

Security depends on data classification

By identifying, organizing and classifying data, states can lay the groundwork for reducing the number of possible breaches, NASCIO finds.

selfie (kiko_kiko/Shutterstock.com)

Fighting tax fraud with electronic IDs

Several states are testing a program that leverages the authentication derived from driver's licenses to ensure tax refunds are sent to their rightful owners.

blockchain (Anton Khrupin/Shutterstock.com)

Illinois taps blockchain to spur government efficiencies

Illinois is experimenting with blockchain in five pilot programs, the state’s CTO Mike Wons told GCN.

code inspection (magic pictures/Shutterstock.com)

Air Force widens military bug bounty program

For its bug bounty program, the Air Force is opening some of its public websites to vetted security specialists from some from the United Kingdom, Canada, Australia and New Zealand.

enterprise security (LeoWolfert/Shutterstock.com)

Lean, mean cyber secure machines

Agencies need systems that are more trustworthy, secure and resilient, cyber experts say.

Topic Resources

  • Take Cybersecurity to the Next Level

    A top challenge for every government agency today is the effective management of cybersecurity risks. Protecting government information and citizens’ personal data has become more challenging as our networks and the amount of data on them has grown exponentially. In this Executive Insights, you’ll learn how a risk-based approach leveraging automation can provide a solid foundation to your agency’s cybersecurity posture.


More from 1105 Public Sector Media Group