voting scrutiny (Bakhtiar Zein/

Are states prepared to protect the next election from hackers?

A House panel heard from several experts who offered recommendations on securing elections infrastructure.

teamwork on puzzle (alphaspirit/

Cybersecurity breaches: It's time to break the silence and work together

The more we promote intelligence sharing and the tools and processes to enable it, the more we all benefit from shared situational awareness, improved security posture and greater defensive agility.

drone over solar panels (Peteri/

Memo charges Chinese-made drones with snooping

A memo from Immigrations and Customs Enforcement's investigative arm claims small DJI drones were most likely downloading sensitive data they gathered in the U.S. to the Chinese government's cloud.

woman working at computer (Gorodenkoff/

Cybersecurity quest sends states to vets, students and women

States are trying to beef up their cybersecurity ranks with internships for veterans, cyber classes for students and mentoring programs for girls.

man with passport and phone (

Extreme digital vetting of visitors to the U.S. moves forward under a new name

Immigration and Customs Enforcement officials have invited tech companies to develop algorithms that will track visa holders' social media activity.

business meeting (YanLev/

MITRE's ATT&CK finds a home in the cybersecurity community

The threat matrix is being leveraged by organizations and incorporated into security products.

hacker at work (Alexander Geiger/

Limiting the insider threat

Solutions that blend technology and process can help agencies improve their defenses against insider threats.

exec with laptop and phone (ImYanis/

Cybersecurity lessons from the campaign trail

A new report offering solid technical advice for political campaigns can be useful to smaller government offices working to secure information.

software development (Legend_art/

Stopping a cybersecurity disaster at the software development level

Developers need a frictionless approach for inserting code analysis into the software development lifecycle that provides continuous visibility and protection when pushing out new code or updates.

website security (Zeeker2526/

Don't leave your front door open to attack

Agencies must ensure their website security can counter today's quickly evolving cyber threats so hackers don't get easy access to internal systems.

secure cloud

AWS aims to put classified data in the cloud

Amazon Web Services' new AWS Secret Region will be available to the intelligence community and other federal agencies.

people voting

How are manufacturers securing their voting machines?

Sen. Ron Wyden (D-Ore.) recently asked five of the country's top voting machine manufacturers what steps they have taken to protect their machines from cyber threats.

Topic Resources

  • Take Cybersecurity to the Next Level

    A top challenge for every government agency today is the effective management of cybersecurity risks. Protecting government information and citizens’ personal data has become more challenging as our networks and the amount of data on them has grown exponentially. In this Executive Insights, you’ll learn how a risk-based approach leveraging automation can provide a solid foundation to your agency’s cybersecurity posture.

More from 1105 Public Sector Media Group