article thumbnail

User-centred cyber security for local government

Open Access Government - Technology News

Arnie Armstrong, Cyber Security Principal at Made Tech , explains why a user-centred cyber security approach is vital to local government We often hear that the biggest cyber security vulnerability in any organisation is its own employees, but is this really the case?

article thumbnail

Plugging the cybersecurity skills gap to retain security professionals

Open Access Government - Technology News

The global pool of security professionals needs to grow 65% to defend organisations’ critical assets – so how can we plug the cybersecurity skills gap? Artificial intelligence is nowhere near the level of sophistication required to achieve this in a security context.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Locking down Super Bowl security

GCN

Federal, state and local government partners are providing air and infrastructure security, cybersecurity, threat assessments and real-time situational awareness.

article thumbnail

The link between climate and national security

McKinsey Public & Social Sector Insights

Former Netherlands chief of defense Tom Middendorp, the “climate general,” discusses efforts to decarbonize defense forces and the security risks that could be heightened by climate change. Aerospace & Defense Insights Aerospace Defense & security Sustainability

Security 122
article thumbnail

States face more nuanced cloud security challenges

GCN

While the federal government can mandate overall cloud security requirements, each state, local and education agency has its own authority, StateRAMP’s Leah McGrath explains.

Security 128
article thumbnail

Federal IT Security Solutions: Creating a More Secure and Effective Future

Government Technology Insider

Uniquely created legacy systems, specific risk factors, and highly sensitive data all require the utmost security from agencies’ IT teams, but equally, those teams must embrace the future of federal IT security solutions.

article thumbnail

Cyberattack turns up the heat on common security problems

GCN

The ransomware attack that crippled a New York county again demonstrated the need for investment, regular updates and an enterprisewide approach to security.

2023 128
article thumbnail

Privileged access: Understanding security inside out

Open Access Government - Technology News

Mark Warren, Product Specialist at Osirium, explains why privileged access poses security issues in the public sector Government organisations are the backbone of the UK. Insiders can also pose security risks Insiders can also pose security risks.

article thumbnail

Password mismanagement still at the heart of security issues

GCN

While many government employees reuse credentials that have been compromised and put online, one expert warned MFA is not the “silver bullet” solution. Cybersecurity

article thumbnail

CISA: Election security still under threat at cyber and physical level

GCN

Threats enacted by state-sponsored actors during the 2022 election have highlighted the need for “continued vigilance” in upcoming elections, said CISA Election Security Advisor Kim Wyman.

2022 98
article thumbnail

Securing the U.S. Electricity Grid from Cyberattacks

GAO (US Government Accountability Office)

Reliable electricity is essential to the conveniences of modern life and vital to our nation’s economy and security. But the electricity grid is an attractive target for cyberattacks from U.S. adversaries—such as nations like China and Russia, as

article thumbnail

Cyber security threats on the rise: how should organisations react

Open Access Government - Technology News

Organisations face the growing risk of becoming victims of cyber security threats – what can they do to avoid them? Organisations face the growing risk of becoming victims of cyber security threats and this is no surprise as it is a highly lucrative enterprise for cybercriminals.

Security 133
article thumbnail

Blockchain offers secure, transparent platform for vital records

GCN

The distributed ledger technology can foster greater trust in data management than traditional systems, one expert says. Emerging Tech

2023 105
article thumbnail

RMCS23: DOD Looks to Adopt Zero-Trust Security Architectures Faster

FedTech Magazine

The Department of Defense isn’t migrating to the cloud fast enough, nor is it spending money on the right security frameworks and capabilities to alter the terrain of cyberspace to its advantage, retired Air Force Maj. Zero-trust security is an integration of products and

2023 105
article thumbnail

Security Threat! Twitter is Hot Mess Right Now: Four Steps to Lock Down Your Library’s Account

Super Library Marketing

Watch now. The Library Marketing???????? Show, Episode 167: This episode is a must-see for any library that posts on Twitter. Elon Musk’s takeover of the social media platform has put accounts at risk.

article thumbnail

Improving Water Security Helps Reduce the Gender Gap in Mexico City

The City Fix

Marginalized groups — such as minorities, rural communities and women — are disproportionately affected by water security issues, and women often play a key.

2021 121
article thumbnail

Building scalable, cost-effective application security

GCN

COMMENTARY | Automated scanning and remediation platforms can identify, fix and prevent security gaps and vulnerabilities at the software application and development levels.

article thumbnail

Getting the word out on election security

GCN

Between rigorous testing and certification, risk-limiting audits and assistance from the Cybersecurity and Infrastructure Security Agency, state and local elections are vastly more secure – even if the public doesn’t know it.

article thumbnail

How the Transportation Security Administration delivers equitable customer experience

Partnership for Public Service

The Transportation Security Administration is responsible for screening and providing information about policies and procedures for all commercial airline passengers, with the agency screening more than 450 million travelers in fiscal year 2020. Many transgender travelers reported “feeling humiliated” after mistreatment by security officers and getting flagged by body scanners designed for binary gender identification.

article thumbnail

Securing IoT requires government, industry collaboration

GCN

As government looks to adopt procurement regulations for internet-connected devices, industry stakeholders are skeptical. Cybersecurity

article thumbnail

Introducing Google Workspace security guidance to address Canadian data security requirements

Google Public Sector

The newly-released Google Workspace security guidance can help government agencies reach compliance by providing steps they can follow to introduce Google Workspace tools while adhering to the GC standards. The guidance can help Canadian teams collaborate without compromising security.

2023 78
article thumbnail

How governments can transform services securely in the cloud

AWS Public Sector Blog

Public sector organizations around the world share a common concern: how can they make sure their digital transformation maintains data security? When governments begin their digital transformations in the cloud, they sometimes still think about security in terms of legacy IT modalities.

article thumbnail

How Security Researchers Strengthen the DoD's Security with HackerOne

CarahCast

Listen in to hear Corben Leo, a Security Researcher from the Hack U.S. link] FOLLOW US ON TWITTER: [link] CONNECT WITH US ON LINKEDIN: [link] LIKE US ON FACEBOOK: [link] LISTEN TO US ON OUR CARAHCAST CHANNEL: [link] READ THE LATEST GOVERNMENT TECH COMMUNITY TRENDS: [link] Listen in to hear Corben Leo, a Security Researcher from the Hack U.S. program, discuss some of the results.

article thumbnail

CISA Offers New Guidance on Supply Chain Security for Customers

FedTech Magazine

The Cybersecurity and Infrastructure Security Agency (CISA), the National Security Agency (NSA) and the Office of the Director of National Intelligence (ODNI) has published the third in a three-part series on securing the software supply chain.

Magazine 103
article thumbnail

Why cyber-physical systems security is crucial for state and local governments

Open Access Government - Technology News

Simon Chassar, CRO at Claroty, discusses why cyber-physical systems security is so integral to government in the modern era Digital transformation allows state and local government agencies to better and more efficiently serve the public.

article thumbnail

It takes a team to secure operational technology

GCN

State and local governments must look for federal and private-sector partners. Cybersecurity

article thumbnail

Visibility Is Vital for Government IT Network Security

State Tech Magazine

These attacks impact the security of sensitive data and can also cost millions of dollars — at a time when states and cities are already facing tight budgets. State and local governments face cyberthreats that are expanding at an alarming rate.

article thumbnail

Inflation: How defense companies can support national security

McKinsey Public & Social Sector Insights

A solid understanding of risk exposure and the contract portfolio can help defense companies support national-security interests. Aerospace & Defense Insights Aerospace

Security 103
article thumbnail

Security Operations Centers and Related Services Augment Slim Government Staff

State Tech Magazine

A security operations center, or SOC, can be the nerve center of a strong state and local cybersecurity effort. SOC teams are charged with detecting, preventing, investigating and responding to cyberthreats, ideally with round-the-clock monitoring of an organization’s network.

article thumbnail

UK councils: keeping local authorities and their residents safe and secure

Open Access Government - Technology News

Cyber Security Data Protection Business Technology Privacy concept. One area where UK councils need to ensure they are laser-focused is around protecting the security of their data. And security has to be baked into that cloud-first position.

article thumbnail

StateRAMP exec sees ‘momentum’ for cloud security standardization

GCN

States’ determination to ensure that their cloud products and vendors are secure is driving membership in StateRAMP, the non-profit dedicated to managing supplier risk.

article thumbnail

Keep Software Supply Chains Secure With New Federal Guidance

FedTech Magazine

To prevent another SolarWinds-type cyberattack, federal agencies — including the National Institute of Standards and Technology (NIST), Cybersecurity and Infrastructure Security Agency (CISA) and National Security Agency (NSA) — have issued new guidance to help agencies better secure their software supply chains.

2021 64
article thumbnail

NIST to launch new guidance on security risks of telehealth and smart home integration

GCN

The National Institute of Standards and Technology will outline the safest ways for consumers to use new technologies that provide access to their health care information in a secure digital environment.

Security 115
article thumbnail

How oil and gas companies can secure supply-chain resilience

McKinsey Public & Social Sector Insights

Operators can implement controls and shift their mindsets to shield against inflationary pressures and uncertainties around labor and material supply. Oil & Gas Insights Oil & Natural Gas

article thumbnail

How fleet management can boost overall data security and integrity

GCN

COMMENTARY | Cloud-based fleet management can provide actionable insights into productivity-related metrics, expenses and asset ROI. Cloud & Infrastructure

2023 78
article thumbnail

How to shore up data protection beyond cyber security policies and standards

Open Access Government - Technology News

We rarely go for long without hearing of an information security breach or cyber-attack to which a public sector body or local council has fallen prey despite significant ongoing efforts and resource deployment to prevent them.

article thumbnail

How the latest FBI CJIS Security Policy updates help you control your criminal justice information

AWS Public Sector Blog

The recent Federal Bureau of Investigation (FBI) Criminal Justice Information Services (CJIS) Security Policy update contains important cloud computing language that aligns with the Amazon Web Services (AWS) approach to building CJIS compliant solutions.

Blog 59
article thumbnail

How does the Information Environment Threaten National Security? (video blog)

GAO (US Government Accountability Office)

Today’s information environment poses opportunities and threats to our national security. Wireless communication and social media have increased the speed and range of information sharing, diffusing the power once held more centrally. In the videos

Blog 98
article thumbnail

How the Internet of Things Can Impact Agency Security

FedTech Magazine

Federal agencies use commercial, off-the-shelf Internet of Things devices for nearly every purpose imaginable, from medical devices and virtual reality goggles to environmental sensors and HVAC systems.

2023 104
article thumbnail

Securing elections to preserve voting access for all Americans

GCN

Compromises to voter registration databases or voting information websites could disrupt an election and call into question the accuracy or legitimacy of the outcome. Cybersecurity

Voting 98