secure phone to transmit medical data from battlefield

Army looks to digitize battlefield medical data

The challenge: Using classified networks to transmit secure-but-unclassified health data and connect field medics to distant treatment facilities.

IoT

NIST maps out IoT security standards

A new draft report aims to help policymakers, managers and others find common ground for securing the internet of things.

secure CPU (HQuality/Shutterstock.com)

Building tools to secure computer processors

Under a DARPA award, Galois will develop security metrics and a framework for making decisions about the tradeoffs in securing CPUs.

secure chip (Virgiliu Obada/Shutterstock.com)

How hardware-based technology keeps mobile devices secure

With the Trusted Execution Environment, government can maximize the use of mobile devices while minimizing the associated risks.

cybersecurity in UK

How the UK created her majesty's cyber service

Britain's Active Cyber Defence program offers agencies basic, automated cybersecurity services to protect "the majority of the people from the majority of the harm from the majority of the attacks the majority of the time."

hybrid cloud

Securing the federal hybrid cloud

By weaving traditionally isolated security resources together into an integrated security fabric, agencies can share threat intelligence and implement automation to make decisions at machine speeds.

A soldier inspects a mobile Warfighter Information Network – Tactical (WIN-T) network node. (Photo by Amy Walker, PEO C3T Public Affairs)

Secure communications on the front lines

PacStar and Fidelis have partnered to create a solution that secures military communications at the tactical edge.

Ransomware on SLED networks

FBI alerts schools to ransomware threat

A hacker group called TheDarkOverlord has been trying to sell private records extorted from almost 100 schools and businesses.

men with mobile phones (View Apart/Shutterstock.com)

Your mobile phone can give away your location, even if you tell it not to

Using a phone's GPS, gyroscopes, microphones and accelerometers, malicious apps can snoop on users and data in the device's memory.

blockchain (whiteMocca/Shutterstock.com)

Illinois builds momentum for blockchain

With lessons learned from pilot projects, the Illinois Blockchain Initiative maps out its next steps.

Are states ill-equipped to manage cybersecurity?

States step up pace of cyber regulations

With the increasing frequency and severity of cyberattacks, state legislators are raising their security requirements, a new report says.

email security

Raising the red flag on recent DMARC hype

DMARC as only a small piece of a much larger email security strategy that must include real-time mailbox-level inspections that analyze both communication habits and sender indicators.

Topic Resources

  • Security in the Cloud: Moving Beyond Compliance

    Creating a fully compliant cloud-based system is hard enough, but even that doesn’t go far enough to ensure security. As federal agencies are migrating to the cloud, some are learning best methods for creating a cloud-based security model they can trust...

  • Easing the Burden of Compliance

    Achieving and maintaining compliance continues to be a top priority for state and local governments. This is especially true when it comes to cybersecurity-related mandates. The processes for ensuring compliance remain a significant challenge because of new and evolving regulations and requirements. Agencies also struggle with reduced staff and budgets to ensure compliance. This eBook examines the current compliance landscape and how technologies like data encryption can help.

  • Using Software as a Service For Innovative Government

    As state and local government agencies continue their efforts to modernize and update their IT infrastructure to streamline operations, reduce costs, and deliver better citizen services, many are finding the Software as a Service (SaaS) model to be effective. Moving to a SaaS platform reduces the management burden on IT, improves access and scalability, reduces cost, and can actually increase security.


More from 1105 Public Sector Media Group