More Cybersecurity Articles
While reports of large organization suffering from cybersecurity breaches continue to emerge, we believe that comprehensive and customizable end-to-end IT security not only dramatically reduces the risks of being compromised but can also have a tremendous benefit to the institution. ThinkShield goes beyond simple endpoint security, with solutions that create huge efficiencies, streamline IT administration, improve the end-user experience.
Agencies must implement visibility, protective controls and continuous monitoring to mitigate the introduction of new risk from the industrial environment to the agency’s IT network.
The few small-scale tests run so far have identified problems and vulnerabilities in the digital systems and government administrative procedures that must be resolved before blockchain-based voting can be considered safe and trustworthy.
The move to more sophisticated 5G mobile networks has been heralded as a leap forward for system security, but potential for on-going intrusions still exists, according to at least one industry expert.
Artificial intelligence and machine learning tools are taking over many cybersecurity tasks, but interpreting the data still depends on humans.
CIOs are increasingly focused on their customers, whether they are residents, employees or other state or local agencies, a new NASCIO survey says.
After suffering one of the most high-profile election attacks in 2016, state and local officials met with federal lawmakers to discuss plans for 2020.
The synergy between policy goals, business needs and digital transformation is crucial to governments' ability to optimize the services they offer.
Building automation systems relying on internet-of-things technologies open entry points for malicious actors to attack other mission-critical networks.
Similar to how airport security depends on concourse design constraints, access control mechanisms and constant monitoring, agencies can minimize API attack surfaces through restrictive design and machine-learning based monitoring.
Over a two-week period, white-hat hackers scoured hundreds of public-facing DOD Information Network proxy servers, virtual private networks and virtual desktops to find and disclose vulnerabilities.
Sign up for our newsletter.