2016 GCN DIG IT AWARDS

Recognizing the best in government IT

GCN dig IT Award nominations deadline has been extended to July 21!

State, local fusion center staff may get seats in NCCIC

State, local fusion center staff may get seats in NCCIC

A new bill would open DHS' National Cybersecurity and Communications Integration Center to state and local agencies to share cyberthreat info.

How to plan for after the hack

How to plan for after the hack

A draft NIST guide urges agencies to plan for recovery as well as prevention.

cybersecurity and fraud

Extending cybersecurity to fraud analytics

While there are some similarities between cybersecurity and fraud, traditional cybersecurity monitoring and analytics must evolve in order to identify the fraudulent use of IT systems that may otherwise go unnoticed.

Army network modernization

Army network modernization drives security, bandwidth improvements

Migrating to cloud architectures could help the Army improve security and bandwidth, according to some Army officials.

DOD to eliminate common access cards

DOD to eliminate common access cards

The Defense Department’s CIO announced a two-year plan to phase out CAC use on information systems.

Is it time to buy cyber insurance?

Is it time to buy cyber insurance?

Cybersecurity insurance not only helps agencies manage the costs of recovering from a breach, it can also foster better security practices.

Missouri raises security awareness with bite-size, monthly interactive training

Missouri builds security awareness with bite-size training

The state has improved its security posture by lowering end-user risk and opening communication channels for security concerns.

Microsegmentation: A new security paradigm?

Microsegmentation: A new security paradigm?

With today’s attack vectors making the traditional security model obsolete, microsegmentation offers a way to secure data at the packet level.

5 ways to avoid compromised database credentials

5 ways to avoid compromised database credentials

Agencies can identify and protect databases from bad actors attempting to use stolen database credentials to appear as legitimate insiders.

Tools to track stolen data through the dark web

Tools to track stolen data through the dark web

Although the information that is lifted from government or corporate networks by criminals is a hot commodity on the dark web, tools are being developed to help officials track their stolen data.

Network defense must improve as hacking profession matures

Network defense must improve as hacking profession matures

Knowing more about organized cybercriminals and the malware marketplace can help IT managers better defend the enterprise, Kaspersky Lab says.

Topic Resources


More from 1105 Public Sector Media Group