woman with connected laptop and phone (SFIO CRACHO/Shutterstock.com)

On the verge of true federal IT modernization

By embracing cloud, biometrics and mobility, agencies can deliver the types of services citizens have come to expect from the private sector.

government cloud

When to purchase cloud security services

Using Gartner's cloud security hype cycle, agencies can determine when technologies are mature and stable enough for government use.

mobile security (Nata-Lia/Shutterstock.com)

DHS invests in mobile app security

The Department of Homeland Security's Science & Technology Directorate is funding research to secure the entire app development lifecycle.

open lock (ESB Professional/Shutterstock.com)

DHS orders Kaspersky software removed from agency systems

Citing the potential that the Russian company's products could be used by "malicious cyber actors" to gain access to federal IT systems, the Department of Homeland Security directed agencies to stop using software.

IoT security

NTIA drafts best practices for patching IoT

Working groups are crafting guidance for mitigating security vulnerabilities in internet-of-things devices and applications.

global ransomware attack

Ransomware defense depends on product upgrades, patches

Intelligence officials encouraged IT managers to patch software and retire products at the end of their lifecycles.

phishing (DesignPrax/Shutterstock.com)

DARPA enlists bots to fight social engineering

DARPA wants to take the onus for detecting phishing schemes off the employee by using bots to detect and identify the sources of social engineering campaigns.

line in airport (06photo/Shutterstock.com)

CBP plans 2018 facial recognition rollout

Customs and Border Protection aims to use facial recognition tech at the top 20 U.S. airports by February 2018, according to a senior agency official.

blockchain (Sotnikov Ivan/Shutterstock.com)

DHS looks to startups for blockchain solutions

The DHS Science and Technology Directorate urges entrepreneurs to incorporate blockchain in homeland security solutions.

voting with paper ballots (Mikko Lemola/Shutterstock.com)

Stronger election security with less technology

While installing layered defenses and purchasing more secure technology would help protect voting machines, less reliance on technology may be the best way to secure the electoral process.

Mask of human head with bar code

The steady convergence of physical and digital identity

Modern identity management requires a layered approach that supports physical and digital identities and allows enables bring-your-own-identity policies.

Legacy voting machines ripe for tampering, breakdowns

Virginia considers decertifying touchscreen voting machines

The state could accelerate the move to systems that provide a paper trail for election audits.

Topic Resources

  • Take Cybersecurity to the Next Level

    A top challenge for every government agency today is the effective management of cybersecurity risks. Protecting government information and citizens’ personal data has become more challenging as our networks and the amount of data on them has grown exponentially. In this Executive Insights, you’ll learn how a risk-based approach leveraging automation can provide a solid foundation to your agency’s cybersecurity posture.