By Clinton Johnson, Margot Bordne
Mar 11, 2021
People and organizations often tell stories using maps. Many use the technology of a geographic information system to gather and store crucial mappable data, process it and, most importantly, display the information in a way that can be easily understood. Sometimes the result is an actual story map, but often GIS produces maps and dashboards that allow stories to emerge from the visuals. The data reflects real people and the way community conditions affect their lived experiences. The maps are therefore useful ways to distill many individual stories into one (or more) overarching narrative.
By GCN Staff
Mar 11, 2021
To keep pace with growing cybersecurity threats, governments must first be able to identify, categorize and prioritize their high-value IT assets, the loss or corruption of which would seriously impact their ability to deliver on essential missions.
Thanks to a $1.2 million grant from the Cybersecurity and Infrastructure Security Agency (CISA), the University of Texas at San Antonio’s Center for Infrastructure Assurance and Security (CIAS) is launching a two-year pilot program to help state, local, tribal and territorial (SLTT) governments better protect themselves against cyberattacks and align their practices with those of the federal government.
CIAS will deliver scalable guidelines, forms, templates, diagrams and tools to support program management, information sharing and best practices that communities can use with their own risk management framework, available resources and authorities. After testing the tools with a select number of SLTT agenci
Four research teams will work to develop a hardware accelerator and software stack for fully homomorphic encryption that can bring the speed of FHE calculations in line with similar unencrypted data operations.
By John Minasyan
Mar 08, 2021
Cyberattacks and data breaches are a daily occurrence and the stakes have never been higher for government agencies and private-sector organizations. Data breaches skyrocketed in 2020, increasing 273% in just the first quarter of the year.
There are countless available technologies aimed at combating cyber threats, yet hackers are innovating faster. Once attackers are in the network, they focus on finding more valuable assets while trying to hide their presence. This east/west attack vector is especially vexing as it’s very difficult to determine where attackers have been and what they have touched.
According to the 2020 Verizon Data Breach Investigations Report, the government sector suffered from 6,843 security incidents from 2019 to 2020, 346 with confirmed breaches. While threat origins are numerous, miscellaneous human-based errors lead the pack in terms of cause, according to the report.