bitcoin in data center

Cryptojacking: The canary in the coalmine?

The theft of CPU power to mine cryptocurrencies does more than siphon off agency resources -- it also opens the door for more malware to affect machines and networks.

digital key (wavebreakmedia/

Encryption management in government hyperconverged IT networks

Today’s hyperconverged networks demand a comprehensive range of encryption solutions to secure data-at-rest and data-in-motion across agencies.

cybersecure new york city

Cybersecurity for smart cities: Changing from reactionary to proactive

Smart cities can increase security with a networking strategy that continually aligns the end-to-end architecture with business goals.

17 reasons not to trust IoT … yet

The National Institute of Standards and Technology has issued a draft report listing 17 "technical concerns" that can undermine trust in internet-of-things products and services.

programmer (nullplus/

Want better security? Look to the autism spectrum

Employees on the spectrum can boast cybersecurity skills that go far beyond the usual hacker.

cybersecurity quality assurance

The overlooked weak link in election security

More than one-third of counties overseeing toss-up congressional elections have email systems that could be vulnerable to hacking, a ProPublica survey finds.

Balancing security with accessibility: Properly managing information and high-value assets

A comprehensive information management program will help agencies more effectively secure their information, while still maximizing the availability of important agency data.

election security (

What election security funding means for state and local CIOs

State and local governments must make informed decisions about how to improve the security of their voting processes.

secure login (13_Phunkod/

Better identity and access management

Comprehensive IAM focused on authentication, authorization, administration and auditing is critical to keeping government information safe.

military common access cards

DOD doubles down on CAC, expands supply-chain defense

The Defense Department's common access card will continue to be a major component of the Pentagon's evolving identity management strategy, DOD CIO Dana Deasy said.

Back to paper ballots

Paper ballots should be required in all states by the 2020 presidential election, according to new report.

mobile management

How ad-hoc mobile security gaps turn into big problems

A unified endpoint management service can make security invisible to the user and help agencies minimize security incidents.

Topic Resources

  • Threats, Fraud and Identity Theft: Keeping Credentials Safe and Secure

    Conversations about identity security cover a broad range of topics, from the physical credentials in use today to the next generation of digital identities. Protecting against threats to identity security requires collaboration from multiple jurisdictions and security experts. In this webinar, we will look at fraudsters’ attempts to replicate or tamper with driver’s licenses and state issued IDs – both in the physical format and as digital IDs. We will outline best practices for managing digital credentials and provide a roadmap for future planning.

  • Security in the Cloud: Moving Beyond Compliance

    Creating a fully compliant cloud-based system is hard enough, but even that doesn’t go far enough to ensure security. As federal agencies are migrating to the cloud, some are learning best methods for creating a cloud-based security model they can trust...

  • IT Consolidation: What's Next for Government Modernization Initiatives?

    IT consolidation has been a high-priority federal initiative for years. While the value is clear, it’s critical for federal IT pros to understand a key piece of the equation: to realize the full value, agencies must also consolidate their ITOM tools.

More from 1105 Public Sector Media Group