Government IT

Government IT | News, how-tos, features, reviews, and videos

gavel / abstract binary lines  >  court judgment / fine / penalty / settlement
e government digital shutterstock 464058242

combat ransomware

Report highlights serious cybersecurity issues with US defense contractors

The CyberSheath report found that US defense contractors are “woefully unprepared” and often don’t meet even the most basic security requirements that would keep military secrets safe.

United States national government cybersecurity  >  Diverse hands surround/protect the U.S. Capitol.

GAO report: government departments need dedicated leaders to oversee privacy goals

A US Government Accountability Office report is calling for a host of changes to improve privacy within various federal agencies and departments. How those changes get implemented will depend largely on the establishment of new...

CSO > global security

Security by design vital to protecting IoT, smart cities around the world, says CEO of UK NCSC

UK National Cyber Security Centre’s Lindy Cameron calls for clear, workable international standards to improve the cybersecurity of the internet of things (IoT), connected devices, and smart cities.

CostaRica on map of America

How Costa Rica found itself at war over ransomware

Costa Rica failed to implement the cyber-preparedness strategy that it laid out five years ago and now serves as an example not only to other Latin American nations but also to the world.

australia elections shutterstock 736415899

Australia’s election officials brace for interference, both foreign and technological

The risk of social-media manipulation exacerbates the fallout from an online-voting disaster.

Australian Parliament House, Capital Hill, Canberra, Australia

Cybersecurity lies at the heart of Australia’s updated Digital Government Strategy

Standards, policies, and new Cyber Hubs lead the rush to be fully digital by 2025.

Vitaliy Panych, CISO, State of California

California state CISO: the goal is “operating as a whole government”

Partnerships with other state entities elevate security capabilities and enhance information sharing to provide better security overall, says California state CISO Vitaliy Panych.

e government digital shutterstock 464058242

E-government: Australia experiences the risks while seeking better digital identity methods

Not all government services are handling citizen credentials well even as digital services grow, but Services Australia is working to change that.

A man with his head in his hands amid abstract security contruct.

NSW agencies fear cyberattacks after report finds ‘significant weaknesses’

The nine state government agencies audited asked the auditor general to not report the findings to Parliament, fearing it would expose weaknesses to cyberattackers.

United States Capitol building / United States Congress / abstract security concept

GAO report faults CIOs, OMB for slow adoption of cybersecurity recommendations

The US agency highlight four areas where cybersecurity gaps in federal agencies threaten national security. Cites OMB for not helping CIOs get available funds.

Lady Justice statue with scales, law books. [regulation / compliance / legal liability / fairness]

FISMA basics: What federal agencies and contractors need to know

FISMA, or the Federal Information Security Management Act, is a U.S. federal law passed in 2002 that seeks to establish guidelines and cybersecurity standards for government tech infrastructure, and in so doing protect government...

What it takes to become an information assurance analyst

This in-demand role calls for a rare combination of superior communication skills and security chops. Learn how one information assurance analyst landed his current job, the skills and training that helped him get there, and where his...

Fraud prevention: Improving internal controls

Internal fraud controls aren't fire-and-forget. Smart collaboration and ongoing improvement will help keep fraud in check. Here are the basics.

information security 2

How to write an information security policy

Learn the critical first step, why consensus is key, what to cover and how make your information security policy — and program — effective.

Red team versus blue team: How to run an effective simulation

Playing the role of an attacker can make your team better at defense. Learn how in our step-by-step guide to war gaming your security infrastructure — from involving the right people to weighing a hypothetical vs. live event.

How to survive (and thrive) in the CISO hot seat

The CISO role is more varied and more pressure-filled than ever. CSO Online looks at how you can be successful in a post where security incidents and management feuds can cost you your job.

Special report: platforms play big in the cloud

This latest report in our C-Suite 360 series takes a full-spectrum look at the opportunities and risks in cloud computing, offering up the expert information your organization needs to set its cloud strategy.

Research report: IT security's looming tipping point

Even as security draws board-level attention, many IT professionals give their organizations’ infosec practices low marks. This special report from CIO, CSO and Computerworld reveals how to tip the balance in the right direction.

Load More
You Might Also Like