facial recognition (Zapp2Photo/Shutterstock.com)

House committee looks into cities’ facial recognition tech

The House Committee on Oversight and Reform has sent letters to big-city mayors asking for documentation on their systems.

secure network (bluebay/Shutterstock.com)

White House aims to harden agency networks

President Donald Trump’s recent executive order on cybersecurity means the White House will take a hard look at eliminating weak links in federal networks.

black hat, gray hat and white hat hackers (By MatiasDelCarmine/Shutterstock.com)

An ethical hacker can help you beat a malicious one

Organizations that engage the services of an ethical hacker can find and fix vulnerabilities on their systems rather than have them exploited.

cybersecurity (By deepadesigns/Shutterstock.com)

The one fix needed to keep Trump's cyber executive order from failing

Without a trustworthy operating system -- especially for critical infrastructure -- real cybersecurity is scientifically impossible.

innovation (ESB Professional/Shutterstock.com)

Don't forget your dig IT nominations

Help GCN showcase great examples of discovery and innovation in government IT.

wannacry ransomware

‘WannaCry’ ransomware attack raises alarm bells for cities, states

IT officials say they often don’t have enough money to effectively fight sophisticated cyber threats, especially one of this scale.

blockchain (By a-image/Shutterstock.com)

Unlocking blockchain for government

Using blockchain technology through permissioned networks can help state governments improve the delivery of their services, a new report finds.

man working on old PC

Are public sector organizations more at risk from cyberattacks on old computers?

Although agencies struggle with outdated computer systems, governments have significant resources to upgrade them to mitigate cyber threats.

cybersecurity (By Titima Ongkantong/Shutterstock.com)

What's next for NIST cybersecurity framework?

In the wake of the WannaCry ransomware attacks, federal agencies, international officials and industry stakeholders convened at NIST to discuss a new version of the Cybersecurity Framework.

two-factor authentication (Inspiring/Shutterstock.com)

Social Security revises two-factor authentication for user accounts

Starting June 10, owners of My Social Security accounts must use a one-time code -- sent to an email address or cell phone -- to access their accounts.

An F/A-18F Super Hornet from Strike Fighter Squadron (VFA) 122 launches off the aircraft carrier USS Carl Vinson (U.S. Navy photo by Mass Communication Specialist Seaman Jacob G. Kaucher/Released)

DOD believes blockchain can boost 3-D printing at the front

An encrypted and distributed ledger system could help solve intellectual property concerns that complicate efforts to produce parts on the fly.

identity in the cloud (Blue Island/Shutterstock.com)

Okta identity service gets FedRAMP approval

The identity management platform received FedRAMP moderate authorization.

Topic Resources

  • Take Cybersecurity to the Next Level

    A top challenge for every government agency today is the effective management of cybersecurity risks. Protecting government information and citizens’ personal data has become more challenging as our networks and the amount of data on them has grown exponentially. In this Executive Insights, you’ll learn how a risk-based approach leveraging automation can provide a solid foundation to your agency’s cybersecurity posture.