Sponsored Resources

More Cybersecurity News

  • modernize CX

    5 ways DMVs could modernize in 2019

    While there's a fundamental need for overall system modernization, state motor vehicle departments can make specific, near-term upgrades that will improve a portion of the DMV experience for both citizens and staff.

  • government cloud

    Revisiting the Trusted Internet Connections as cloud matures

    To take advantage of the cloud, accommodate remote employees and boost security, government must reconcile previous cloud security models with today's reality, a top cyber official said.

  • Senators want insights into hack attempts

    In a letter to the sergeant at arms, two senators call for statistics on the number of Senate computers have been compromised and the times hackers have successfully accessed sensitive Senate data.

  • tech budget

    What Trump’s 2020 budget has to say about cyber

    The administration's cyber priorities include increasing the qualified pool of cyber workers in government and boosting funds for cyber risk assessments, investigations and law enforcement.

  • predictive analytics (Elnur/Shutterstock.com)

    How AI, private-sector innovations secure supply chains

    Predictive analytics can give agencies and their contractors a better understanding of supplier risks over time so they can make more informed decisions.

  • U.S. Fleet Cyber Command/U.S. 10th Fleet (FCC/C10F) at Fort George G. Meade, Maryland, Sept. 27, 2018. (U.S. Navy photo by Mass Communication Specialist 1st Class Samuel Souvannason/Released)

    US military steps up cyberwarfare effort

    Cyber Command's campaign against the Russian Internet Research Agency indicates a priority shift from reacting to electronic intrusions into military networks to engaging in active operations that seek to stop enemies from achieving their objectives.

  • network of people and metrics (Sergey Nivens/Shutterstock.com)

    Protect your agency from security risks on social media

    The consequences of a government-managed social media account falling into the wrong hands can have far-reaching impacts both for government and citizens.

  • enterprise security (Omelchenko/Shutterstock.com)

    DARPA tackles enterprise threat protection

    The Cyber-Hunting at Scale program seeks to develop automated tools that can detect and protect multiple Defense Department enterprise networks from nefarious actors and novel attack vectors.

  • cloud-based security

    Is your agency ready to function in a secure hybrid cloud?

    Knowing what’s on the network, how it’s being used and by whom is essential before security protocols for a hybrid cloud environment can be correctly set up.

  • Digital forensics for large-scale networks

    With a new collection of open-source tools and code wrappers, network forensic investigators can capture, selectively analyze and reconstruct files from network traffic. The all-in-one toolkit is free for law enforcement teams in the U.S.

Stay Connected

Sign up for our newsletter.

I agree to this site's Privacy Policy.