Security

Secure websites and a secure online presence foster trust between the public and government.

More News and Events on Security

98 posts

HTTPS For All

With the release of a new dashboard to measure best Web practices in the federal government and the establishment of a government-wide HTTPS Only Standard, the time to make the switch to HTTPS has arrived. Agencies have until December 31, 2016, to make the switch. The move to HTTPS is not only happening in government;
Jun 15, 2015

Sharing Social Media Strategies: The National Strategy for Trusted Identities in Cyberspace Program Office

Creating a tweet, posting a photo, or updating a status may take mere seconds. However, a well-thought-out social media strategy is needed for long-term success. In fact, the recently released U.S. Public Participation Playbook mentions strategy in its very first play: clearly define and communicate your objectives. Knowing what you hope to accomplish and how
Apr 03, 2015

HTTP vs HTTPS: Is it Time For a Change?

Data. Security. Privacy. These are the cornerstones of many discussions concerning technology. The security of citizen information when interacting with the federal government will be increasingly important as we progress into the future. A few agencies have begun to use Hyper Text Transfer Protocol Secure (HTTPS) in lieu of the standard HTTP. For these agencies,
Mar 25, 2015

Beware the Cyber Security House of Horrors!

Ghosts. Ghouls. Zombies. Multi-stakeholder content audits. This Halloween there is no shortage of terrors lurking to keep federal Web managers up all night, and our work is largely done in one of the scariest domains of all: cyberspace. Every moment of every day, a vast system of computers and networks are actively working to support
Oct 30, 2014

State CIO Top Ten Policy and Technology Priorities for 2014

Security, consolidation, cloud services and enterprise portfolio management top the list of critical state CIO priorities in 2014, according to state information technology leaders surveyed by the National Association of State Chief Information Officers (NASCIO). The prioritized rankings of strategies and technologies reflect voting by state CIOs and are
Nov 22, 2013

Cloud Computing in the Federal Government

Cloud Computing enables convenient, on-demand access to, and rapid deployment of, shared computing resources such as networks, servers, storage, applications, and services. Plan What is the Cloud? Is Cloud Computing for you? What types of services does Cloud Computing support? Types of Cloud environments Implement Learn steps to acquire, manage, and secure your agency
Oct 17, 2013

Mobile Product Security and Privacy Testing Resources

Security testing is used to ensure that a mobile product does not pose a threat to agency IT systems and databases. In addition, privacy testing ensures that an app does not put the user’s personally identifiable information into a compromisable position. This article was developed as part of the Mobile Application Development Program. See our
Aug 05, 2013

API Security

Like website development, API security revolves around three stages—planning the API, testing the API, and monitoring the API after it has launched. The planning stage requires those involved to conceptually map several design decisions and the impact that they will have on security. The second stage applies your agency’s security program to the API release
Jul 29, 2013

Twitter’s Two Step Verification Process

To enhance security, Twitter now offers two-step verification. The release of the new feature follows several high-profile account breaches – including a false tweet sent from the Associated Press’s Twitter account in April. If you chose to enable the two-step verification feature, Twitter sends a text message with a unique code to a cell phone that must be
May 31, 2013