open lock (Alexander Softog/

Oregon governor signs data breach law

The legislation will toughen the state's consumer data breach laws, requiring that residents be notified within 45 days after a data breach has been discovered.

Partnership (sdecoret/

Cybersecurity partnerships: Strength in numbers

Public sector organizations are forming partnerships to better share threat information and provide tactical cybersecurity training to IT staff.

casting paper ballot (Sergey Tinyakov/

Congress puts $380 million toward election security

The omnibus funding bill includes grant funding to help states secure their election systems.

NIST targets APTs with resilience strategies

With advanced persistent threats becoming more common, the National Institute of Standards and Technology offers guidance on creating more secure systems.

secure election (WhiteDragon/

Senate committee wraps up investigation, issues election security recommendations

The Senate Select Committee on Intelligence released its initial recommendations on election security after investigating Russian attempts to target election infrastructure during the 2016 U.S. elections.

global network (NicoElNino/

Patching security holes in GPS, computer timing

Researchers have developed techniques to detect fake GPS time and location signals and correct the information in real time.

laptop user (4Max/

Explainer: What is differential privacy and how can it protect your data?

By adding random noise to the aggregate data, differential privacy can protect information about individual users while still providing accurate results from database queries.

TARDEC autonomous vehicle (Isiah Davenport)

Defending military vehicles against cyberattacks

The Army is scouting for an intrusion defense system for military ground vehicles that will protect against cyberattacks.

social media tools on phone (Vasin Lee/

Should government social media accounts be treated as critical infrastructure?

Social media accounts used for timely or sensitive communications should be subject to the same cybersecurity practices followed by the energy, transportation and chemical sectors.

election security (

Best practices for election systems security

A new handbook from the Center for Internet Security details ways jurisdictions can improve the security of their digital elections systems.

voting scrutiny (Bakhtiar Zein/

Is your county elections clerk ready for Russian hackers?

In a decentralized election system with more than 10,000 separate jurisdictions, the onus for security is on local officials.

lock on a chip ( image)

Can IoT transmissions be securely encrypted?

MIT researchers have developed a tiny, low-power chip that is hard-wired to perform public-key encryption.

Topic Resources

  • Security in the Cloud: Moving Beyond Compliance

    Creating a fully compliant cloud-based system is hard enough, but even that doesn’t go far enough to ensure security. As federal agencies are migrating to the cloud, some are learning best methods for creating a cloud-based security model they can trust...

  • IT Consolidation: What's Next for Government Modernization Initiatives?

    IT consolidation has been a high-priority federal initiative for years. While the value is clear, it’s critical for federal IT pros to understand a key piece of the equation: to realize the full value, agencies must also consolidate their ITOM tools.

  • Case Study: City of Fayetteville

    What if you could find out what animals needed attention at the animal shelter, which sporting equipment was used most frequently in the city gym, which parking garage spaces were available most often, and when traffic was the busiest around city hall — all in a matter of minutes, from anywhere? Although this may sound futuristic, government organizations, like the city of Fayetteville, are already using technology to solve for these questions, and much more.

More from 1105 Public Sector Media Group