Tips for Securing Elections, From Experts Who Know
Much of good election security is also just good cybersecurity. Lessons learned in recent years point the way to best practices for government at all levels.
Much of good election security is also just good cybersecurity. Lessons learned in recent years point the way to best practices for government at all levels.
GovLoop interviewed Elham Tabassi, Chief of Staff for the Information Technology Lab (ITL) at the National Institute of Standards and Technology (NIST).
Furthering NIST’s mission, Robert Hanisch travels around the world to bring data management to the heart of science and advocate for the use of open data.
To learn more about the best approaches to enterprise risk management (ERM), we turned to the foremost source on government standards for security: NIST.
A Senior Policy Adviser at NIST’s Trusted Identities Group shared government trends and what identity and access management means for everyday employees.
The PIF program is also a chance for the government to educate the private sector and public about the importance of federal research, which has spawned watershed technologies.
By offering a flexible approach to cybersecurity, the CSF allows agencies to create individualized risk-management plans based on their specific needs and capabilities.
What exactly does the CSF recommend and how can governments use it to tackle their own unique organizational concerns?
Federal agencies often overlook the recovery step of a cyberattack. Given all the energy that agencies must put into detecting, defending and responding to an attack, this omission is understandable, but today more than ever, recovery is critical.
Is the federal government taking threat detection seriously?