Using active breach detection to keep government data safe

Using active breach detection to keep government data safe

Next-generation breach detection marries big-data and machine learning to deep cybersecurity expertise to maximize defense against breaches and threats.

Workspace-as-a-service platforms incorporate desktop virtualization

The case for disappearing desktops

Workspace-as-a-service platforms that incorporate desktop virtualization features are among the latest technologies to support the burgeoning government mobile workforce.

Vulnerabilities persist in TSA’s Security Technology Integrated Program

Vulnerabilities persist in TSA’s Security Technology Integrated Program

An inspector general audit reveals vulnerabilities in servers, outdated operating systems and physical and security deficiencies in the Transportation Security Administration system that connects airport security systems to central TSA servers.

Next-gen networks call for strategic security

Next-gen networks call for strategic security

A hybrid approach to network modernization can be cost-effective for agencies and deliver real improvements in capacity, availability and security.

IBM

Watson takes on cybersecurity

Watson for Cyber Security will leverage the platform’s natural language processing to provide insight to threats.

What agencies need to know when working with a FedRAMP-approved vendor

What agencies need to know when working with a FedRAMP-approved vendor

Agencies are responsible for three broad areas of compliance: user management, privacy and training.

4 steps to secure data management

Establishing the right technology ecosystem can address agencies’ data security challenges, including how and where to store data and control access.

DISA evaluates DODIN defense through adversary’s eyes

DISA evaluates DODIN defense through adversary’s eyes

The cybersecurity review examines the DODIN from an adversary’s perspective to better prepare network defenders.

NIST previews new federal authentication guidelines

NIST previews new federal authentication guidelines

The National Institute of Standards and Technology is calling on the public to help it map out new guidelines for federal agencies' digital authentication practices.

How ID can move out of the wallet and onto the smartphone

How ID can move out of the wallet and onto the smartphone

HID Global’s goID platform lets government agencies issue identity credentials over the air to users’ smartphones, from which they can transfer relevant ID data to requestors.

4 tips for preventing cyberattacks on the workforce

Lessons from tax season: 4 tips for preventing cyberattacks on the workforce

Scams targeting employees during this recent tax season serve as a sobering reminder of the significant security risks workers unknowingly pose to their organizations.

The encryption challenge

The encryption challenge

The obstacles are daunting -- money, time, careless users, encryption-resistant legacy systems. But the risks are no less serious.

Topic Resources


More from 1105 Public Sector Media Group