federal blockchain

How blockchain can transform the public sector

Government agencies are taking their cues on blockchain from commercial industries, such as banking, education, manufacturing and retail.

global IoT (Pasuwan/Shutterstock.com)

A call for global action on cyberattacks

The unprecedented security risks posed by artificial intelligence and machine learning demand an array of technological, legal and policy countermeasures, a new report says.

voting in california in 2012 (Joseph Sohm/Shutterstock.com)

Elections officials explore security options

Despite new financial support from Congress, local officials say they need more help securing their election systems ahead of the 2018 elections.

cybersecurity (vs148/Shutterstock.com)

NIST lays groundwork for encrypting IoT devices

The National Institute of Standards and Technology wants feedback on draft requirements for standardizing lightweight cryptography for internet-of-things devices.

People voting

Pennsylvania plots strategy for election security funds

The commonwealth directs all counties to have voter-verifiable paper record voting systems in place by the end of 2019.

malware

Evasive malware: A growing threat to state and local governments

Capable of transforming itself, evasive malware can persist and burrow deeper into networks and endpoints over long periods of time.

Russian cyberattacks

Russia targeting network infrastructure, US and UK officials warn

For more than a year, Russia-aligned cyber entities have been using a series of exploits to target millions of network devices.

homeless (Olga Pinegina/Shutterstock.com)

Blockchain-based identity for the homeless

Austin, Texas, is exploring how distributed-ledger technology can be used to help the homeless secure their personal records and access government resources.

The new cyber landscape

With tight budgets the only constant, agencies face a fast-evolving range of challenges -- from securing hybrid networks and authenticating users who connect via mobile devices and the cloud.

business meeting (marvent/Shutterstock.com)

10 best practices for bolstering security and increasing ROI

Justifying cybersecurity initiatives in terms of dollars and cents can be just as challenging as implementing them.

4 layers of enterprise security

Tools that verify traffic, isolate networks, prevent data loss and protect the endpoints are helping agencies lock down government data.

responders in new york (Christopher Penler/Shutterstock.com)

A digital wallet for first responder credentials

The Mobile Device and Attributes Validation app uses a digital wallet of "capsules," each holding a validated attribute or credential for first responders.

Topic Resources

  • Security in the Cloud: Moving Beyond Compliance

    Creating a fully compliant cloud-based system is hard enough, but even that doesn’t go far enough to ensure security. As federal agencies are migrating to the cloud, some are learning best methods for creating a cloud-based security model they can trust...

  • Easing the Burden of Compliance

    Achieving and maintaining compliance continues to be a top priority for state and local governments. This is especially true when it comes to cybersecurity-related mandates. The processes for ensuring compliance remain a significant challenge because of new and evolving regulations and requirements. Agencies also struggle with reduced staff and budgets to ensure compliance. This eBook examines the current compliance landscape and how technologies like data encryption can help.

  • Using Software as a Service For Innovative Government

    As state and local government agencies continue their efforts to modernize and update their IT infrastructure to streamline operations, reduce costs, and deliver better citizen services, many are finding the Software as a Service (SaaS) model to be effective. Moving to a SaaS platform reduces the management burden on IT, improves access and scalability, reduces cost, and can actually increase security.


More from 1105 Public Sector Media Group