Maxwell Air Force Base (USDA/Wikimedia Commons)

Air Force tests wireless smart perimeter

Under an agreement between the Air Force and AT&T, Maxwell Air Force Base is testing a sensor network and facial recognition technology to improve base security.

Locked Shields 2017 (NATO’s Cooperative Cyber Defense Centre of Excellence)

Cyber defenders hone skills in international wargame

For Locked Shields 2017, 800 participants from 25 nations defended a fictional military air base in the face of attacks on its electric power grid, drones, military command and control systems and other operational infrastructure.

spreading cyber attack (fotogestoeber/Shutterstock.com)

Cyber attacks 10 years on: from disruption to disinformation

Since the cyber attack on Estonia in 2007, internet-based incursions have escalated massively, but their targets have become more diffuse, indicating future attacks may target information and opinion.

security (ranjith ravindran/Shutterstock.com)

Security depends on data classification

By identifying, organizing and classifying data, states can lay the groundwork for reducing the number of possible breaches, NASCIO finds.

selfie (kiko_kiko/Shutterstock.com)

Fighting tax fraud with electronic IDs

Several states are testing a program that leverages the authentication derived from driver's licenses to ensure tax refunds are sent to their rightful owners.

blockchain (Anton Khrupin/Shutterstock.com)

Illinois taps blockchain to spur government efficiencies

Illinois is experimenting with blockchain in five pilot programs, the state’s CTO Mike Wons told GCN.

code inspection (magic pictures/Shutterstock.com)

Air Force widens military bug bounty program

For its bug bounty program, the Air Force is opening some of its public websites to vetted security specialists from some from the United Kingdom, Canada, Australia and New Zealand.

enterprise security (LeoWolfert/Shutterstock.com)

Lean, mean cyber secure machines

Agencies need systems that are more trustworthy, secure and resilient, cyber experts say.

global network (Pushish Images/Shutterstock.com)

Police around the world learn to fight global-scale cybercrime

The multinational cooperation involved in successfully taking down the Avalanche network can be a model for future efforts in fighting digital crime.

college student on computer (HQuality/Shutterstock.com)

The secret source for cyber hires

The Scholarship for Service program produces top-quality cyber graduates who have committed to work in government. It's federally funded, but state, local and tribal agencies can reap the benefits.

information exchange (Bakhtiar Zein/Shutterstock.com)

DHS preps Cyber Incident Data Repository

CIDAR aims to identify trends, mitigate threats and calculate risks for enterprise risk managers and cybersecurity insurance companies.

health data (everything possible/Shutterstock.com)

A clean bill of health for data security

Government health care institutions and agencies can safeguard their confidential information and lower their risk of data breaches by following best practices around people, encryption and security policies.

Topic Resources

  • Take Cybersecurity to the Next Level

    A top challenge for every government agency today is the effective management of cybersecurity risks. Protecting government information and citizens’ personal data has become more challenging as our networks and the amount of data on them has grown exponentially. In this Executive Insights, you’ll learn how a risk-based approach leveraging automation can provide a solid foundation to your agency’s cybersecurity posture.


More from 1105 Public Sector Media Group