hidden cobra botnet

US-CERT details North Korean bot

The alert from the U.S. Computer Emergency Readiness Team explains how network defenders can detect and mitigate the Hidden Cobra DDOS botnet.

login as root

Weave your cybersecurity tactics into a cohesive strategy

By protecting the credentials used to spread an attack, IT managers can mitigate damage after an initial breach.

quantum computing (Brookhaven National Lab)

How quantum mechanics can change computing

Although large-scale quantum computers do not yet exist, they may hold the key to the future of internet security.

risk management

How agencies can comply with the cyber executive order

The risk-management approach requires agencies to have a clear and detailed understanding of their IT environment.

community meeting (Rawpixel.com/Shutterstock.com)

Communities forming around blockchain for government

The Government Blockchain Association and DC Blockchain Center are bringing public- and private-sector officials together to leverage the technology in the government space.

facial recognition for drivers license

NY's facial recognition program continues to nab fraudsters

To date, the technology has flagged more than 21,000 cases of possible identity fraud.

USS John S. McCain (Navy photo by Petty Officer 3rd Class James Vazquez)

Cyber suspicions floated after latest ship collision

The Navy says there is no sign of cyber intrusion, but "all possibilities" will be investigated.

smart grid rolling out (DarwelShots/Shutterstock.com)

NIST tackles smart grid framework update

The entire energy ecosystem has shifted since the National Institute of Standards and Technology last updated its guidelines for smart grid interoperability.

hacker (Dmitry Tishchenko/Shutterstock.com)

Tracing the sources of today's Russian cyber threat

Some of the most talented and dangerous cyber warriors and criminals come from Russia, a long-time meddler in other nations' digital systems.

Los Angeles is launching Cyber Lab

LA launches Cyber Lab to share threat data

The public-private partnership will disseminate threat intelligence generated by the Los Angeles Integrated Security Operations Center.

voting (Alexandru Nika/Shutterstock.com)

Defending the 'front line' against election fraud

Counties and local municipalities need help -- and funding -- to defend their election systems from security threats.

whatsapp (dennizn/Shutterstock.com)

End-to-end encryption isn't enough security for 'real people'

Computer scientists must improve security where we are most vulnerable -- on our own devices.

Topic Resources

  • Take Cybersecurity to the Next Level

    A top challenge for every government agency today is the effective management of cybersecurity risks. Protecting government information and citizens’ personal data has become more challenging as our networks and the amount of data on them has grown exponentially. In this Executive Insights, you’ll learn how a risk-based approach leveraging automation can provide a solid foundation to your agency’s cybersecurity posture.


More from 1105 Public Sector Media Group