responders in new york (Christopher Penler/Shutterstock.com)

A digital wallet for first responder credentials

The Mobile Device and Attributes Validation app uses a digital wallet of "capsules," each holding a validated attribute or credential for first responders.

people voting (Gino Santa Maria/Shutterstock.com)

Election security means much more than just new voting machines

Securing electoral systems across the U.S. is a big problem with high stakes, so the federal money being provided to states must be used as efficiently as possible.

software (whiteMocca/Shutterstock.com)

NIST details software security assessment process

The National Institute of Standards and Technology has released draft guidance on automating the assessment of the security controls that manage software.

paper ballot (Alexandru Nika/Shutterstock.com)

Paper trails and random audits could secure all elections -- don’t save them just for recounts in close races

The prospect of audits will in itself deter anyone with malicious intent, reducing the likelihood of an attack. And the audits themselves will help the voting public be sure any tampering is likely to be discovered.

cyberwar 2025 (U.S. Navy photo illustration by Master Sgt. David

A game to bridge the cyber training gap

CyberWar: 2025 increases players' knowledge and experience of the planning, preparation, execution and assessment of joint cyberspace operations.

health data (Supphachai Salaeman/Shutterstock.com)

GAO: CMS needs better security for its Medicare beneficiary data

The Center for Medicare & Medicaid Services isn’t doing enough to secure data that is accessed by external entities, GAO found.

facial recognition

How NIST helps facial recognition make better matches

The National Institute for Standards and Technology’s Face Recognition Vendor Test evaluates the algorithms used in facial recognition technologies.

system logs (whiteMocca/Shutterstock.com)

Security fundamentals: Log management

Log management plays a central role in facilitating effective cyber situational awareness across an agency.

passwords (image by shutterstock.com)

Pennsylvania rolls out risk-based authentication to agencies

The Office of Administration’s risk-based multifactor authentication service gives commonwealth employees secure access to cloud resources and agency applications.

estonia data center

Estonia experiments with blockchain, smart services and 'data embassies'

Estonian President Kersti Kaljulaid discussed how the country's digital service and security efforts serve its citizens.

locked phone (Wright Studio/Shutterstock.com)

Crypto crumpling could solve the encryption conundrum

Researchers have found a way to maximize user privacy while still giving governments "exceptional access" to encrypted data.

businessman at wall (rudall30/Shutterstock.com)

It's time for a new approach to segmentation

Inserting a trust-aware boundary between corporate access networks and servers creates zero-trust partitions that strands adversaries before they can reach critical assets.

Topic Resources

  • Security in the Cloud: Moving Beyond Compliance

    Creating a fully compliant cloud-based system is hard enough, but even that doesn’t go far enough to ensure security. As federal agencies are migrating to the cloud, some are learning best methods for creating a cloud-based security model they can trust...

  • IT Consolidation: What's Next for Government Modernization Initiatives?

    IT consolidation has been a high-priority federal initiative for years. While the value is clear, it’s critical for federal IT pros to understand a key piece of the equation: to realize the full value, agencies must also consolidate their ITOM tools.

  • Case Study: City of Fayetteville

    What if you could find out what animals needed attention at the animal shelter, which sporting equipment was used most frequently in the city gym, which parking garage spaces were available most often, and when traffic was the busiest around city hall — all in a matter of minutes, from anywhere? Although this may sound futuristic, government organizations, like the city of Fayetteville, are already using technology to solve for these questions, and much more.


More from 1105 Public Sector Media Group