Cybersecurity

Just how continuous should continuous security monitoring be?

It's common knowledge that organizations should regularly assess their security readiness. But how often should they scan their security assets and system configurations?

Cybersecurity

Novel cybersecurity approach has plenty of fans—and naysayers

The Consensus Audit Guidelines are supposed to help agencies fix cybersecurity by focusing on the most dangerous threats first. But critics say the voluntary measures are redundant -- or worse.

Cybersecurity

Consolidating access control yields big payoffs

Centralizing formerly separate user identity management systems can lower costs, increase security and productivity, and lay the foundation for new online services.

Cybersecurity

3 stages of identity consolidation

These are the building blocks and the capabilities that result from a consolidated identity management system.

Digital Government

Geospatial preparedness checklist

A committee of the National Academies' National Research Council studied the role of geospatial data and tools in emergency management and produced this checklist that outlines the most valuable types of geospatial data and real-time data collection methods.

Digital Government

Geospatial apps help temper Mother Nature's fury

Government agencies find that linking sensors to other geospatial data could improve emergency management, environmental monitoring and homeland security.

Digital Government

A mappable mashup

The National Weather Service's Ridge 2 system fuses ground-based radar and human-created weather alert data with geospatial data and makes it available to other agencies and the public.

Cybersecurity

Assessing a training program

NIST Special Publication 800-16 recommends four ways to evaluate the effectiveness of a cybersecurity training program.

Cybersecurity

5 tips for cybersecurity-training your employees

Government security managers recommend several techniques for evaluating the effectiveness of employee cybersecurity training and improving the odds that the lessons will sink in.

Cybersecurity

Chief information security officers answer 4 burning questions

6 government chief information security officers have a round-table discussion about the most dangerous new cybersecurity threats and best strategies for addressing those risks.