security plan

18F automates compliance documentation

The Compliance Masonry platform lets users actively interact, update and generate assurance reports for any type of risk management framework.

governments get failing grades in cybersecurity

Government still failing to protect IT systems

A new report finds that government agencies at all levels ranked dead last in cybersecurity against major private industries.

Congressman sees broader role for DHS in state and local cyber efforts

Congressman sees broader role for DHS in state and local cyber efforts

Rep. Will Hurd (R-Texas) says a reorganized "cyber infrastructure protection" division could serve as a valuable resource and central point of contact.

cybersecurity

GAO takes IRS to task over security weaknesses

Inconsistent application of agencywide security controls puts taxpayer information at risk, the Government Accountability Office said.

cybersecurity in the spotlight

Putting cybersecurity culture in the spotlight

A panel of chief information security officers discussed how they make employees part of the agency’s cybersecurity defense.

MobileIron combines device, cloud and app security

MobileIron combines device, cloud and app security

MobileIron Access helps secure cloud data accessed through commonly commercial apps on mobile devices.

Credential exchange enabled on DHS info sharing network

Credential exchange enabled on DHS info sharing network

A backend attribute exchange streamlines identity management by keeping users' security credentials on local systems but making them accessible from other network locations.

big data analysis

Sifting suspicious user behavior to find real threats

The cloud threat funnel methodology can help agencies uncover the user behavior patterns that lead to legitimate threats.

Machine analytics help San Diego protect its systems

Machine analytics help San Diego protect its systems

The city teamed up with Splunk to monitor and analyze its machine-generated data.

chain of command

DOD lacks clear chain of command for domestic cyber attacks

The Pentagon has not defined how it will support civilian authorities in the event of cyber attacks, according to a Government Accountability Office report.

New mobile biometric tools on tap for ICE agents

New mobile biometric tools on tap for ICE agents

NEC's newest biometric fingerprinting device promises faster and more accurate data collection in the field.

Standardizing secure by default

Standardizing secure by default

Building data secure by default is now technically possible, but a standard must be developed before we’re faced with a stream of fragmented, unsecured data.


More from 1105 Public Sector Media Group