• Do you know where your mobile data is?

    Do you know where your mobile data is?

    Recent hacks of celebrity data that had been saved to the cloud illustrate the need to be aware of what your mobile devices – agency-issued or BYOD – are doing and where the data is going.

  • Cubes floating in space

    The growing security threat to virtual systems

    Malware innovators are evading automated analysis, forcing agencies to secure virtual machines and networks as completely as other classic IT.

  • Personal Identity Verification card

    Happy birthday HSPD-12; there’s still a long way to go

    The presidential directive mandating interoperable smart government ID cards is 10 years old this month, and represents an impressive effort to specify and implement the technology. Now we need to put it to use.

    Comments: 2
  • Man using Samsung phone in raid

    Will Knox tip government buyers toward Android?

    Samsung’s Knox containerization technology, together with sophisticated vetting in defense and security circles, is gaining traction in federal, state and local markets.

    Comments: 2
  • Laptop at empty table

    GSA makes room at the table for the CISO

    A new IT policy letter from the GSA’s CIO aims to ensure that the agency’s senior security officer is a part of all IT projects, not just brought in after the fact to monitor compliance.

  • Next-gen cybersecurity means anticipating threats

    Next-gen cybersecurity means anticipating threats

    Maintaining effective cyberthreat defenses not only requires constant vigilance but also an eye on the road ahead.

    Comments: 3
  • Role for humans in cybersecurity automation

    Security automation: Are humans still relevant?

    The increasing complexity and sophistication of cyberthreats is driving the use of automation in cybersecurity. Where does human intelligence fit in the picture?

    Comments: 2
  • Will NIST break its close relationship with the NSA in developing cryptographic and cybersecurity standards?

    NIST's future without the NSA

    Can the standard agency develop effective cryptographic and cybersecurity standards without the help of the National Security Agency?

  • Windows Server 2003: The end is nearer than you think

    Windows Server 2003: The end is nearer than you think

    It can take seven months or more to migrate to a new server operating system, so Microsoft's July 2015 cut-off date for Windows Server 2003 support really is just around the corner.

  • Stakes rising as malware matures

    Stakes rising as malware matures

    How can government best position itself against cyberattacks, which seem to be increasing both in number and sophistication?

inside gcn

  • Congressman sees broader role for DHS in state and local cyber efforts

    Automating the ATO