Government news, analysis, research, how-to, opinion, and video.

scales of justice law
digital europe circuit board barbed wire barrier obstacle thinkstock

cloud computing shared public cloud

Are shared services the answer to data protection?

There are still some issues to be addressed before everyone will be fully on board with the idea of shared services in government. But because the government is increasingly moving to the cloud, the sooner everyone is on board, the...

vulnerable security breach innocent attacked

The global ungoverned area

Looking at the Internet through Westphalian-tinted glasses is not going to make us safer or more secure.

CIO Leadership Live with MITRE Corp.

CIO Leadership Live with Joel Jacobs, CIO at MITRE Corp. | Ep 4

Show host Maryfran Johnson talks with CIO Joel Jacobs of MITRE Corp., a private non-profit research organization that provides consulting, engineering, and technical services for numerous federal government agencies. A big part of its...

1a bullet

Mandatory Breach Notification is not a silver bullet

Global experience demonstrates that a Notifiable Data Breach (NDB) regime does little to make organizations act to ensure ongoing information security. And with generous exemptions provided by the Australian NDB rules, data breaches,...

protection privacy security internet network lock

3 ways to make the most of GDPR

EU regulations provide an unprecedented opportunity to elevate cybersecurity as a business enabler.

vulnerable gdpr breach security cyber attack

GDPR keeping you up? There’s another monster hiding under the bed…

There’s another deadline in May that needs to be paid attention to – the NIS Directive.


Why the cybersecurity industry is failing government

One problem is that tech companies still try to force-fit their commercial applications into the federal space. But that's not the only issue...

keys to access solutions world in palm of hand

May the forces be with you: using IPaaS for IAM and GDPR

Getting your head around GDPR with some new tools of the trade.

Collage of US flag and government icons

U.S. companies could get badly burned by GDPR – here's how not to

Knowing how GDPR is different from the regulations your company is already complying with will help determine the gaps that exist between the two.

Unicorn GDPR IDC

6 steps for GDPR compliance

Failure to comply will be costly.

Government building with greek columns

What trust and safety leaders need to know after Google, Facebook and Twitter Senate hearings

And how social platforms can overcome increased scrutiny and regulations.

cyber insurance primary2

NAIC Model Law passes

What the new insurance data security regulation means and mean and how it will impact the insurance sector.

digital europe circuit board barbed wire barrier obstacle thinkstock

Navigating the General Data Protection Regulation with data maps

Companies need to know their data to better protect it and comply with the General Data Protection Regulation (GDPR).

Post office box

Government entities remain vulnerable to insider threats

Recommendations on how the U.S. Postal Service and other government entities can improve cyber security.

170315 fbi 2

Inside the Russian hack of Yahoo: How they did it

One mistaken click. That's all it took for hackers aligned with the Russian state security service to gain access to Yahoo's network and potentially the email messages and private information of as many as 500 million people.

pt 2 image

U.S. Cyber Command gains status | Salted Hash Ep 1, Pt 2

Reporters Steve Ragan and Fahmida Rashid discuss the implications of the U.S. Cyber Command's recent elevation in status, putting it on the same level as the military’s other functional combatant commands.

build freelance tech worker team teambuilding

Separation of duties and IT security

Muddied responsibilities create unwanted risk and conflicts of interest. New regulations such as GDPR now require that you pay more attention to roles and duties on your security team.

Election 2016 teaser - Electronic voting security for digital election data

We can't accept election hacking as a new normal

As the investigations into whether Russian hackers influenced the 2016 Presidential election in the US continue, the rest of the world prepares for the new normal of election hacking.

Load More