secure election (WhiteDragon/

NY puts money into election security

New York Gov. Andrew Cuomo announced funding to secure the state's elections infrastructure and protect against foreign interference.

files in cloud exposed

Misconfigured cloud leaves voter data exposed

The latest elections-related cybersecurity incident involves an robocalling company that left nearly 2,600 files containing voter information in an exposed Amazon S3 bucket.

secure chip (Maxx-Studio/

Microprocessor designers realize security must be a primary concern

Some innovations in chip design have let secrets flow freely out of computer hardware the same way software vulnerabilities have led to cyberattacks and data breaches.

paper ballot (Alexandru Nika/

The newest risks for state election systems: Russian owners and remote access

A top voting machine vendor admits to putting remote-access software on systems for years, while Maryland officials are seeking DHS' help after discovering a different contractor's Russian connection.

system security (Titima Ongkantong/

The 2016 election: A lesson on integrity

If change in any of the many systems that make up the election infrastructure cannot be detected, the integrity of the election process cannot be assured.

encryption key (Feylite/

Using encryption to help fight data breaches

Unified key management solutions offer a centralized approach and work across clouds, both on-premises and in data centers.

cyber insurance concept (Jirsak/

Cyber insurance: Can you afford not to have it?

Cybersecurity insurance not only helps with expenses related to incident response, forensics and remediation, but it also helps keep agency security professionals on top of cyber defense.

programmer (Gorodenkoff/

Government leads the way in crowdsourced security

The adoption of bug-bounty programs in government has increased 125 percent increase year over year, according to a new report.

russian email hack (Bakhtiar Zein/

Mueller indictment details hacks on state election systems

The charges describe how two of the Russian conspirators hacked into computers at state offices and an election software supplier to steal voter data and other information.

voting scrutiny (Bakhtiar Zein/

Senators push for increased elections security

Although states are working to improve their elections systems security, some senators believe that there’s much more that could be done.

Georgia Cyber Center

Georgia invests in cybersecurity

The Georgia Cyber Center is a collaborative space where state agencies, universities and industry will work together on the state’s greatest cybersecurity challenges.

blockchain protected contracts

Delaware to test blockchain for corporate filings

The Delaware Department of State is working on two proofs of concept that leverage the distributed ledger technology for components of corporate filing processes.

Topic Resources

  • Threats, Fraud and Identity Theft: Keeping Credentials Safe and Secure

    Conversations about identity security cover a broad range of topics, from the physical credentials in use today to the next generation of digital identities. Protecting against threats to identity security requires collaboration from multiple jurisdictions and security experts. In this webinar, we will look at fraudsters’ attempts to replicate or tamper with driver’s licenses and state issued IDs – both in the physical format and as digital IDs. We will outline best practices for managing digital credentials and provide a roadmap for future planning.

  • Security in the Cloud: Moving Beyond Compliance

    Creating a fully compliant cloud-based system is hard enough, but even that doesn’t go far enough to ensure security. As federal agencies are migrating to the cloud, some are learning best methods for creating a cloud-based security model they can trust...

  • IT Consolidation: What's Next for Government Modernization Initiatives?

    IT consolidation has been a high-priority federal initiative for years. While the value is clear, it’s critical for federal IT pros to understand a key piece of the equation: to realize the full value, agencies must also consolidate their ITOM tools.

More from 1105 Public Sector Media Group