Client-side encryption enables Gmail for state users

Client-side encryption enables Gmail for state users

Maryland used Virtru Pro to ensure email is encrypted before it’s sent, making it compliant with requirements of the Health Insurance Portability and Accountability Act and Criminal Justice Information Services.

Biometric authentication growing for mobile devices, but security needs work

Biometric authentication growing for mobile devices, but security needs work

Hacks of phone-based fingerprint readers and facial recognition software underscore the need for multifactor identification.

How to address the 6 most overlooked causes of data breaches

How to address the 6 most overlooked causes of data breaches

By addressing weaknesses in human factors, agencies can reduce their attack surface and make every employee a soldier in the battle against cyberattacks.

Open IT, security key to smart city future

Open IT, security key to smart city future

Cities are looking for open and secure solutions to help enable smart city development, according to a new report from IDC.

Panel issues cybersecurity call to arms

Presidential panel issues cybersecurity call to arms

To highlight the nation's biggest and most urgent cybersecurity issues, a new 100-page report calls for an all-hands-on-deck approach to addressing cyber risks.

6 cyber predictions for 2017

6 cyber predictions for 2017

McAfee’s annual report on the cybersecurity landscape holds some tips for government IT managers.

Guidelines for bug reporting

Guidelines for bug reporting

Although the new policy only applies to certain websites, it aims to better protect government information by making vulnerability reporting easier.

DLA secures supply chain with DNA marking

DLA secures supply chain with DNA marking

The Defense Logistics Agency may expand its use of DNA marking technology to verify the authenticity of microchips and other electronics in its supply chain.

San Francisco latest victim of ransomware

San Francisco latest victim of ransomware

The city’s light transit systems were hit with malware that shut down ticketing machines and demanded payment.

How secured printing can control data leaks

4 ways to avoid data risk from printing

Secure document management minimizes the exposure of sensitive printed, faxed or scanned data to anyone but the personnel who have a “need to know.”

Deletion before disclosure: How NYC can protect municipal ID cardholders’ privacy

Deletion before disclosure: How NYC can protect municipal ID cardholders’ privacy

To protect the privacy of undocumented New York residents, the mayor said the city could wipe its database of municipal identify cardholders before 2017.

Virtualized browser service now boasts CAC integration

Virtualized browser service now boasts CAC integration

Authentic8's Silo is now configured with DOD's public certificates, allowing for secure authentication of Common Access Card users.

Topic Resources

  • Take Cybersecurity to the Next Level

    A top challenge for every government agency today is the effective management of cybersecurity risks. Protecting government information and citizens’ personal data has become more challenging as our networks and the amount of data on them has grown exponentially. In this Executive Insights, you’ll learn how a risk-based approach leveraging automation can provide a solid foundation to your agency’s cybersecurity posture.


More from 1105 Public Sector Media Group