risk management

How states are using data to manage cybersecurity risk

by • 8 months ago

States are increasingly using data to improve how they address their biggest problems, including their biggest problem: managing cybersecurity risk.

West Virginia launches new IT risk and compliance platform

by • 9 months ago

West Virginia announced it will use tools from the Canadian software firm Galvanize to automate processes around IT risk management and compliance.

North Dakota urges residents to take free cyber risk assessments

by • 10 months ago

The state's cybersecurity education program now includes a free risk assessment tool that scores users on the risk level of their computing environments.

Virginia builds new model for quantifying cybersecurity risk

by • 2 years ago

Where previously estimations and anecdotes sufficed, a new mathematical model will place precise dollar amounts on the IT security risks the state faces.

Cybersecurity tops state administrators' risk-management list

by • 2 years ago

A recent survey sets the stage for government administrators, as many states are still evolving on how they manage risks to government operations.

GSA releases 'de-risking' handbook for state technology projects

by • 2 years ago

Published on Github, the guide is designed to help non-technical budgeting officials grasp modern software-development best practices.

On cybersecurity, many local governments still lack strategic or disruption response plans

by • 3 years ago

A new infographic from the Public Technology Institute shows that while local governments are increasingly adopting cybersecurity training for employees, they often lack cyber planning.

Why cyberthreat intelligence offers the best defense against agency cyberattacks

by • 3 years ago

A new briefing report advises government IT leaders on how to gain an upper hand against cyberthreats by leaning on timely, accurate and relevant information.

Four-point plan highlights how central logging can improve cyber-resilience

by • 3 years ago

Report urges agencies to look beyond traditional security technologies and capture four key sets of data to improve their overall security posture.

TwitterFacebookLinkedInRedditGmail