New & Notable
Government information security management News
January 15, 2020
Microsoft patched a critical vulnerability in how Windows validates cryptographic certificates that could lead to dangerous attacks, according to experts, and was originally reported by the NSA.
December 16, 2019
The city of New Orleans declared a state of emergency as the government tries to get systems back online following a ransomware attack Friday morning.
December 12, 2019
The U.S. Department of Defense has developed a five-level certification framework designed to vet the cybersecurity posture of potential contractors in an effort to avoid future risks.
November 19, 2019
A ransomware attack on Louisiana government systems has been contained, according to Governor John Bel Edwards, and experts are praising the state's response.
Government information security management Get Started
Bring yourself up to speed with our introductory content
Encryption is the method by which information is converted into secret code that hides the information's true meaning. The science of encrypting and decrypting information is called cryptography. Continue Reading
The NIST incident response plan involves four phases enterprises can take to improve security incident handling. Expert Mike O. Villegas reviews each step. Continue Reading
The National Security Agency is the official U.S. cryptologic organization of the United States Intelligence Community under the Department of Defense. Continue Reading
Evaluate Government information security management Vendors & Products
Weigh the pros and cons of technologies, products and projects you are considering.
Attendees at the ACSC conference strategized about what ideal threat intelligence sharing looks like. Learn more about the future of collaborative cyberdefense. Continue Reading
For Xerox CISO and former White House deputy CIO Alissa Johnson, cybersecurity lessons learned in the public sector are proving relevant in her current role. Continue Reading
Tensions between the U.S. and Russia have led to source code reviews on security products, but the process isn't new. Expert Michael Cobb explains what to know about these reviews. Continue Reading
Manage Government information security management
Learn to apply best practices and optimize your operations.
A Michigan county CISO says government workers are under siege by cybercriminals. In this case study, he shares how his IT security awareness training strategy has evolved. Continue Reading
Government and private industry share responsibility for critical infrastructure and key resources protection. Follow four steps to understand and know who you're gonna call to protect CIKR. Continue Reading
When considering a local government cybersecurity program, companies must understand the dangers of not having one. Matt Pascucci explains why a program designed to monitor the public sector is crucial. Continue Reading
Problem Solve Government information security management Issues
We’ve gathered up expert advice and tips from professionals like you so that the answers you need are always available.
A Department of Homeland Security initiative strives to improve cybersecurity information sharing between the public and private sector, but familiar challenges remain. Continue Reading
There's no evidence that threat actors have been able to manipulate or change vote counts in our elections, but Kevin McDonald says that doesn't mean it can't -- or won't -- happen. Continue Reading
Alvaka Networks' Kevin McDonald looks at the real-world damage caused by data leaks at the CIA and NSA, which have put dangerous government cyberweapons in the hands of hackers Continue Reading