Locking down voting tech (ShutterStock image)

Locking down voting tech

State election officials are making plans to tighten security all along the voting chain -- from voter registration to machine integrity and audit trails -- with help from the Department of Homeland Security under the new critical infrastructure designation.

Today’s ransomware could become tomorrow’s security nightmare (ShutterStock image)

Today’s ransomware could become tomorrow’s security nightmare

Any weak link breached by ransom-seeking hackers can also be exploited by bad actors with more malicious goals.

A cautionary tale of IT and OT dependencies

A cautionary tale of IT and OT dependencies

An inspector general’s report identified problems at NASA that are no doubt familiar to IT managers at large organizations working keep IT and operational technology systems secure.

Self-destructing messages won’t fly in government

Self-destructing messages won’t fly in government

If Trump administration staff members are using an app that deletes messages after they are read, they may be in violation of records preservation rules.

cybersecurity (Shutterstock image)

DHS to demo cyber defenses at RSA

The Department of Homeland Security’s booth will feature 12 government-funded solutions that are ready for pilot deployment and commercialization.


FEMA's secret weapon for risk management

Amid all the security solutions and compliance standards, the most effective tool is decidedly low tech.


Locking down containers

A new security solution lets government agencies share data via cryptographically secure containers.

controlling risk (ShutterStock image)

Why government agencies must embrace CDM

The risk-based approach of the Continuous Diagnostics and Mitigation program shifts cybersecurity from solely a technical issue to an everyday business priority.

What’s keeping states from adopting CDM?

What’s keeping states from adopting CDM?

Technically, state and local governments can buy tools and services from the Department of Homeland Security’s Continuous Diagnostics and Mitigation program, but few have jumped on board.

IoT security (ShutterStock image)

Working groups tackle IoT security

National Telecommunications and Information Administration’s working groups made initial presentations on securing the internet of things.

social media user at the airport (ShutterStock image)

DHS eyes social media as lever for ‘extreme vetting’

Browser histories, telephone contacts and social media use may help DHS supplement the sometimes spotty or even non-existent data on travelers available from their home countries.

identity and access management

Resolving trust issues in collaborative work ecosystems

Contextual access-control solutions grant access to resources according to context-based security policies.

Topic Resources

  • Take Cybersecurity to the Next Level

    A top challenge for every government agency today is the effective management of cybersecurity risks. Protecting government information and citizens’ personal data has become more challenging as our networks and the amount of data on them has grown exponentially. In this Executive Insights, you’ll learn how a risk-based approach leveraging automation can provide a solid foundation to your agency’s cybersecurity posture.

More from 1105 Public Sector Media Group