federal blockchain

GSA ramps up blockchain exploration

The U.S. Federal Blockchain Forum will give stakeholders an opportunity to develop, share and discuss practical use cases for blockchain technology for agency missions.

nuclear power plant (vlastas/Shutterstock.com)

Info sharing takes a hit in nuclear breach notification

Alerts of a recent spear-phishing attack may have damaged information sharing between government and critical infrastructure owners, experts say.

computer hack (MARCUSZ2527/Shutterstock.com)

Gloomy cyber forecast from Black Hat

IT pros at the annual security conference expect a successful cyberattack on U.S. infrastructure in the next two years.

secure mobile medical data

Endpoint security: Keeping virtual desktops safe for the remote workforce

Advanced endpoint management lets agencies secure virtual applications and desktops while giving users access to the data and applications they need.

encryption concept (BeeBright/Shutterstock.com)

IARPA explores easy-to-use cryptography

A new program will look at developing tools that architects and programmers can use without having to understand the nuances of specific cryptographic concepts.

Indiana IT

Indiana’s cybersecurity game plan

Indiana CIO Dewand Neely spoke with GCN about his cybersecurity strategy in the wake of recent ransomware attacks across the country.

worker typing (HAKINMHAN/Shutterstock.com)

DIUx taps Plurilock for AI authentication

Defense officials are adding an additional layer of security to workplace computing through an artificial-intelligence system that monitors keystrokes and mouse behavior of individual users.

GCN dig IT awards

Deadline extended for 2017 dig IT award nominations

You have until July 15 to help GCN identify the innovative tech that's transforming government at all levels.

hybrid IT

Hybrid IT and data security musts

The key to an agency's successful cloud or hybrid IT implementation is to understand and maximize its cloud security posture in advance of the move.

 ‘Clunky,’ low-tech voting system still vulnerable to hacks

DHS: 21 states' voting systems probed by Russian hackers

In some cases the hackers got inside the systems, but their tampering had no connection to vote counts, according to a Department of Homeland Security official.

mobile malware (Morrowind/Shutterstock.com)

Explainer: How malware gets inside your apps

Malware can be inserted into applications by attackers who modify apps and republish them, by compromised in-app advertising or by corrupted development tools.

cybersecurity discussion

Experts hash out next-generation cyber defenses

A new collection of essays highlights effective cybersecurity defenses that can be leveraged by public-sector organizations.


More from 1105 Public Sector Media Group