The predictive analytics arms race

The predictive analytics arms race

Agencies are mining data to fight fraud, but the criminals may have better algorithms.

Security from the start: Using DevOps for secure collaboration

Security from the start: Using DevOps for secure collaboration

By including security in all aspects of development and operations processes, agencies can move from a reactive to a proactive security posture.

How to secure 911 systems

How to secure 911 systems

While the threats facing emergency response systems depend on what type of infrastructure jurisdictions possess, officials can take steps to protect their networks.

panel on managing IoT risk hosted by the Center for Strategic and International Studies

How can we manage IoT risk?

A recent panel focused on government’s role in managing the risks associated with the Internet of Things.

One year after OPM breach, cyber execs see little improvement

One year after OPM breach, cyber execs see little improvement

A new report shows nearly 60 percent of respondents believe that their agency currently struggles to understand how cyberattackers can breach their systems.

Using active breach detection to keep government data safe

Using active breach detection to keep government data safe

Next-generation breach detection marries big-data and machine learning to deep cybersecurity expertise to maximize defense against breaches and threats.

Workspace-as-a-service platforms incorporate desktop virtualization

The case for disappearing desktops

Workspace-as-a-service platforms that incorporate desktop virtualization features are among the latest technologies to support the burgeoning government mobile workforce.

Vulnerabilities persist in TSA’s Security Technology Integrated Program

Vulnerabilities persist in TSA’s Security Technology Integrated Program

An inspector general audit reveals vulnerabilities in servers, outdated operating systems and physical and security deficiencies in the Transportation Security Administration system that connects airport security systems to central TSA servers.

Next-gen networks call for strategic security

Next-gen networks call for strategic security

A hybrid approach to network modernization can be cost-effective for agencies and deliver real improvements in capacity, availability and security.

IBM

Watson takes on cybersecurity

Watson for Cyber Security will leverage the platform’s natural language processing to provide insight to threats.

What agencies need to know when working with a FedRAMP-approved vendor

What agencies need to know when working with a FedRAMP-approved vendor

Agencies are responsible for three broad areas of compliance: user management, privacy and training.

4 steps to secure data management

Establishing the right technology ecosystem can address agencies’ data security challenges, including how and where to store data and control access.


More from 1105 Public Sector Media Group