• Wrenches and bolts to tighten security for the Internet of Things

    Tools to tighten the Internet of Things

    Built with cost and performance in mind, interconnected systems contain vulnerabilities that are increasingly attractive to attackers looking for protected information or who want to disrupt public services. Some tools are emerging to help.

    Comments: 2
  • encryption

    Last call for comments on Keccak encryption

    The public will weigh in on NIST's choice of new a secure hash algorithm developed in response to advances in techniques for breaking of federal document encryption standards.

  • Man with bug spray against stinkbugs

    Is antivirus now useless?

    Debates over the state of antivirus technology and tools has resurfaced yet again after the executive in charge of Symantec's information security business was quoted as saying antivirus is dead.

    Comments: 1
  • Man juggling spinning remote IT devices

    Is shadow IT spinning out of control in government?

    It's not a new problem, but it is getting worse, and government needs to be more agile in responding to the influx of consumer IT into the enterprise.

  • Looking for insider threats

    Insider threat detection tools: Hard to find, harder to fund

    A new survey shows that with little money to spend on tools aimed at insider threats, most organizations have to limp along by jerry-rigging existing, and unsuitable, cybersecurity tools to do the job.

    Comments: 1
  • Man keeping secret about a security vulnerability

    Would the government have told us about Heartbleed? Should it?

    The government says it did not know about the OpenSSL vulnerability before it was publicly disclosed. But if it had known, it might not have told us, says White House Cybersecurity Coordinator Michael Daniel.

    Comments: 1
  • heartbleed and encryption key

    Heartbleed begets headaches in perfecting encryption

    New guidelines on improving encryption tools in the wake of the Heartbleed bug offer a range of options for improving encryption, but bigger changes loom down the road.

  • Device login screens plugged into the cloud

    Federating identity will slow personal information leaks

    Having a single credential that can be authenticated by a trusted authority and accepted by multiple users can reduce the attack surface by maintaining personally identifiable information at a single point.

    Comments: 2
  • Man looking at light bulbs

    Takeaways from Verizon's data breach report

    Despite all of the fervor and money that's being directed at government cybersecurity, a more immediately effective remedy might be to tighten up on information handling processes and procedures and general data hygiene.

  • Man blamed for using open source

    In the wake of Heartbleed, open source software is under scrutiny

    Open source software is not inherently more risky than proprietary, but you should be involved if you use it. “If it’s open source and it’s not secure, it’s partly your fault.”

    Comments: 1

inside gcn

  • consolidation (By tereez/

    Inside Kentucky's strategy for improving IT operations

More from 1105 Public Sector Media Group