How secured printing can control data leaks

4 ways to avoid data risk from printing

Secure document management minimizes the exposure of sensitive printed, faxed or scanned data to anyone but the personnel who have a “need to know.”

Virtualized browser service now boasts CAC integration

Virtualized browser service now boasts CAC integration

Authentic8's Silo is now configured with DOD's public certificates, allowing for secure authentication of Common Access Card users.

Justice Department issues smart gun specs

Justice Department issues smart gun specs

After six months of conversations with firearms companies, experts and law enforcement, the Department of Justice issued specifications for law enforcement smart guns.

What you can do today to protect against quantum computing

What you can do today to protect against quantum computing

Agencies must be ready to protect sensitive government data from the potentially devastating hacking threats that loom just beyond the horizon.

Can blockchain bring interoperability to healthcare?

Can blockchain bring interoperability to health care?

The distributed ledger technology may be able to manage and secure health information that flows back and forth among patients, doctors, insurance companies and federal agencies.

Hurd: CIO, CISO picks vital for cybersecurity agenda

Hurd: CIO, CISO picks vital for cybersecurity agenda

Rep. Will Hurd (R-Texas) says filling the federal CIO and CISO positions will be big first steps toward ensuring cybersecurity.

Can government agencies ever unmask the insider threat?

Can government agencies ever unmask the insider threat?

Allegations against contactor Harold Martin are a critical reminder that protecting against insider threats requires more than employee awareness.

Cybersecurity expert Bruce Schneier testifying before Congress on the government’s role in regulating the internet of things.

Experts to Congress: IoT regulation may be inevitable

If industry fails to self regulate in light of security challenges facing IoT devices, the government could be forced to step in.

NIST calls for holistic approach to security

NIST calls for holistic approach to security

Special Publication 800-160 urges organizations to address security throughout the systems engineering process.

4 tips for bug bounty programs

4 tips for bug bounty programs

A well-run program offers agencies a way to extend their penetration testing and network monitoring programs.

autonomous vehicles

Driverless car policy aims to accelerate safe deployment

The Federal Automated Vehicles Policy provides a framework to improve roadway safety and provide direction for the next administration.

bug bounty

Army fires up bug bounty program

Following the Pentagon’s successful bug bounty program, the Army has announced its own "Hack the Army" program to tighten up security on its public-facing websites.

Topic Resources

  • Take Cybersecurity to the Next Level

    A top challenge for every government agency today is the effective management of cybersecurity risks. Protecting government information and citizens’ personal data has become more challenging as our networks and the amount of data on them has grown exponentially. In this Executive Insights, you’ll learn how a risk-based approach leveraging automation can provide a solid foundation to your agency’s cybersecurity posture.