Insider Insights

  • secure network (bluebay/

    Network security: Age matters less than maturity

    Network administrators must ensure that their infrastructures are mature enough to handle the latest threat as well as rapidly changing security requirements.

  • Phishing

    Phishing is still a big problem, but users can help shrink it

    If employees have an easy way to spot and report suspicious emails, security teams will get a steady stream of front-line threat intelligence.

  • A forward-located Control and Reporting Center. Air Force photo.

    Data security at the tactical edge: Rightsizing solutions

    As data center functionality moves to the field, data protection capabilities must adapt to address challenges posed by edge deployments.

  • security compliance

    Security fundamentals: Policy compliance

    Policy compliance isn’t about the utility or value of what’s actually implemented; it’s about the process of assessment.

  • cloud checklist

    Government data in the cloud: Provider and user responsibilities

    Agency IT managers must ensure that their providers are using the latest techniques and technologies to protect data.

  • phishing (DesignPrax/

    Countering the mobile phishing challenge

    Mobile endpoint security solutions can help agencies protect government networks from sophisticated phishing attacks targeting employees' devices.

  • Man with umbrella watching coming storm

    Takeaways from the DC-area WEA system test

    When emergency managers across the National Capital Region sent a test message to 5.5 million people through the Wireless Emergency Alert system, they learned the value of multiplatform communications.

  • cloud lightbulb (Khakimullin Aleksandr/

    If IGs are going to work together, they need better collaboration tools

    Unified communications as a service can help inspector general offices collaborate without a major overhaul of each agency's communications environment.

  • key in cloud (Blackboard/

    Securing the public cloud with HSM as a service

    While traditional hardware security modules may have proved difficult to deploy in the public cloud, HSMaaS solutions offer data security and management at cloud scale.

  • data scan (Titima Ongkantong/

    Security fundamentals: File integrity monitoring

    Agencies that can shift their risk management perspective from a piecemeal approach to a holistic one focusing on integrity management will start seeing benefits that span security, compliance and IT operations.

inside gcn

  • cybersecure new york city

    Cybersecurity for smart cities: Changing from reactionary to proactive

More from 1105 Public Sector Media Group