SCILock hard disk

SCILock protects against persistent malware

CRU’s SCILock Secure Drive protects operating systems and other software from unauthorized changes, preventing malware from taking hold and becoming persistent.

healthcare data security

NJ takes on cyber threats to health care

The New Jersey Cybersecurity and Communications Integration Cell is working to enhance threat information sharing among health care providers.

How local government can manage technology risk

How local government can manage technology risk

A recent report outlines how local governments can manage common types of technology-related risks.

Road to driverless vehicles paved with risk

Road to driverless vehicles paved with risk

Questions on safety standards and cybersecurity still need to be answered before connected and autonomous vehicles make their way onto the nations roadways.

CPB deploys facial recognition system at JFK airport

CBP deploys facial recognition system at JFK airport

Customs and Border Protection will use facial recognition technology at three terminals in John F. Kennedy International Airport in New York City to verify travelers’ identities.

Innovations that strengthen cybersecurity

ACT-IAC assembled recommendations from industry, government and academia on ways agencies can reinforce their cybersecurity programs.

Unmasking malware coders

Unmasking malware coders

Army researchers are working on an algorithm that will help system administrators improve security by more easily identifying malware authors and tracking the origin of threats

Password security starts with making life easier for the user

To address the challenges inherent in password-based security, the U.K. government is taking a different tack -- encouraging its systems administrators to simplify their approach to passwords and use automated controls.

ID check at military installation

DOD requires Real ID-compliant driver’s licenses for facility access

The Defense Department will no long accept the driver’s licenses or state-issued identification from Illinois, Minnesota, Missouri, New Mexico, Washington and American Samoa for entrance to its facilities.

Unisys stealth in AWS marketplace

Unisys Stealth now available on AWS cloud

The solution was designed to provide advanced security to AWS customers while giving Unisys clients ease of access and scale of the AWS cloud.

Massive Linux vulnerability discovered

Massive Linux vulnerability discovered

The zero-day vulnerability allows Android or Linux applications to escalate privileges and gain root access.

NASCIO priorities

Cybersecurity is job #1 for NASCIO

The National Association of State Chief Information Officers named cybersecurity the top item in its advocacy agenda.

More from 1105 Public Sector Media Group