network monitoring (nmedia/

National Guard team builds open-source cyber toolkit

The Missouri National Guard Cyber Team's RockNSM platform gives cyber incident response teams insights into attempted breaches and overall network health.

voting (Joseph Sohm/

Committee urges broader election security protections

The Senate Select Committee on Intelligence is calling for states to protect voter registration databases, assess voting machines for risk and deploy better detection technology across their election infrastructure.


NIST updates Risk Management Framework

The draft version of the Risk Management Framework highlights the interdependence of IT security and privacy protection.

cloud-based security (Omelchenko/

Agencies grow to trust the cloud, but still must verify

Although the cloud has demonstrated its utility, agility and scalability, federal execs underscore the importance of security.

key in cloud (Blackboard/

Securing the public cloud with HSM as a service

While traditional hardware security modules may have proved difficult to deploy in the public cloud, HSMaaS solutions offer data security and management at cloud scale.

cloud forensics

Digital forensics library for investigators

The online repository supports creating legal policy and procedures around the lawful access to evidence from public and private cloud sources.

bitcoin mining (archy13/

Cryptojacking spreads across the web

Users are being tricked into downloading scripts that use their computers to perform the complex mathematical calculations required by distributed-ledger applications.

data scan (Titima Ongkantong/

Security fundamentals: File integrity monitoring

Agencies that can shift their risk management perspective from a piecemeal approach to a holistic one focusing on integrity management will start seeing benefits that span security, compliance and IT operations.

secure network

Iowa offers public-sector network clients a la carte security services

To underscore the need for upstream cybersecurity, the Iowa Communications Network is offering its offering clients a free, extensive threat assessment.

woman working at computer (Gorodenkoff/

Connecticut tasks law enforcement with cyber duties

The Connecticut Cybersecurity Action Plan calls for a dedicated entity to investigate cybercrimes and threats to individuals, businesses and critical infrastructure.

checking data (alphaspirit/

Do you know where your data's been?

Data lineage gives IT managers visibility so they can trace errors, debug applications or recreate lost output.

blockchain (Andrew Derr/

Forging a blockchain agencies can use

Agency blockchain projects must address risk, change management and training as part of their strategy, a GAO exec says.

Topic Resources

  • Security in the Cloud: Moving Beyond Compliance

    Creating a fully compliant cloud-based system is hard enough, but even that doesn’t go far enough to ensure security. As federal agencies are migrating to the cloud, some are learning best methods for creating a cloud-based security model they can trust...

  • IT Consolidation: What's Next for Government Modernization Initiatives?

    IT consolidation has been a high-priority federal initiative for years. While the value is clear, it’s critical for federal IT pros to understand a key piece of the equation: to realize the full value, agencies must also consolidate their ITOM tools.

  • Case Study: City of Fayetteville

    What if you could find out what animals needed attention at the animal shelter, which sporting equipment was used most frequently in the city gym, which parking garage spaces were available most often, and when traffic was the busiest around city hall — all in a matter of minutes, from anywhere? Although this may sound futuristic, government organizations, like the city of Fayetteville, are already using technology to solve for these questions, and much more.

More from 1105 Public Sector Media Group