Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
Home » Topics » Sectors » Government: Federal, State and Local

Government: Federal, State and Local
Government: Federal, State and Local RSS Feed RSS

Most people don't consider cybersecurity as a career field

New research indicates positive perceptions about cybersecurity professionals

September 23, 2020

The 2020 Cybersecurity Perception Study finds most people still don’t view cybersecurity as a career field for themselves, even as nearly one-third (29%) of respondents say they are considering a career change.


Read More
Kauai's bubble system moves forward as contingency plan

Is Kauai's travel bubble unnecessary?

September 22, 2020

Kauai's original hotel bubble involving several island resorts for COVID-19 safety has been put to the side after Gov. David Ige’s announced this week that as of Oct. 15 Hawaii will start admitting trans-Pacific travelers who record one negative COVID-19 test within three days of arrival, eliminating the need for resort bubbles. However, at least two high-end Kauai resorts will move ahead with establishing themselves as “bubble” hotels despite the Governor's decision.


Read More
Singapore implement facial recognition for government identity program

Singapore announces first government use of facial verification tech for national identity program

September 22, 2020

Four million Singaporeans can now access digital government services online using facial verification under the National Digital Identity program. 


Read More
DOJ and Marshals service to implement facial recognition for prisoner identification

DOJ is looking into facial recognition for agent devices to identify prisoners

September 18, 2020

The U.S. Marshals Service, charged with moving prisoners around the nation, released a request for quotes to build a facial recognition tool into its agents’ smart devices to help identify prisoners during transfer.


Read More
Can the voting process be hacked? Yes it can.

Can the voting process be hacked?

Carnell Council
Carnell Council CISSP
September 17, 2020

The term "Kill Chain Methodology" or "Cyber Kill Chain" has been widely used in the world of cybersecurity to interpret the different stages involved in a cyberattack. In a nutshell, from a hacker's perspective, a kill chain is a way to illegally gain access to a network or network device via a series of progressive steps. Consequently, from a defender's perspective, every stage of this process presents an opportunity to prevent intrusions. So, what kind of systems, networks or devices can hackers exploit by employing this methodology? Let's talk about the election.


Read More
New Orleans uses video technology to surveil illegal dumping activity

City of New Orleans uses video surveillance to tackle illegal dumping

September 17, 2020
Illegal dumping is a problem in many cities around the world and enforcing laws to prevent it can be quite difficult and resource-intensive. New Orleans has taken a technology-based approach to tackling the problem, and it's working.
Read More
new study says public-private partnerships best way to cybersecure governments

More than 80% of government cybersecurity leaders say private-public partnerships a necessity

September 17, 2020
According to a new report, public-private collaboration would help government leaders keep pace with cyberthreats.
Read More
Tennessee election committee focusing on video surveillance and physical security for November election

Tennessee county to focus on physical security for November election poll sites

September 17, 2020

The Hamilton County Election Commission in Tennessee plans to utilize money from the Federal Cares Act to focus on physical security in time for the November election.


Read More
SEC0918-cyber-feature-slide1_900px

Chinese Ministry of State Security-affiliated cyber threat actor activity targeting US agencies

September 15, 2020
The Cybersecurity and Infrastructure Security Agency (CISA) has consistently observed Chinese Ministry of State Security (MSS)-affiliated cyber threat actors using publicly available information sources and common, well-known tactics, techniques, and procedures (TTPs) to target U.S. Government agencies.
Read More
delaware department of corrections opens intelligence security center for situational awareness

Delaware's Department of Corrections opens Intelligence Operations Center

September 14, 2020

Delaware's state correctional leaders opened the Department of Correction Intelligence Operations Center (IOC). The statewide facility will be operated by the Special Operations Group within the Bureau of Prisons. The IOC positions will allow the DOC to identify security threats from across facilities, assess them, and proactively act to mitigate those risks.

 


Read More
Previous 1 2 … 62 63 64 65 66 67 68 69 70 … 146 147 Next
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

Popular Stories

Man in suit

How to Safeguard Executives Through Proactive Planning and Managing Online Presence

2026

What Security Leaders Could Expect in 2026

Coding

Epstein File Data Security Update: Raw Code Found in Emails

Man coding

The Copilot Problem: Why Internal AI Assistants Are Becoming Accidental Data Breach Engines

NFL footballs

Security Risks Around Super Bowl LX: What Security Leaders Should Be Watching

SEC 2026 Benchmark Banner

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

February 26, 2026

Zero Incidents vs. Zero Tolerance – Workplace Violence Prevention Best Practices that Work

Workplace violence remains one of the most complex challenges facing healthcare organizations today. For executive security professionals, the stakes have never been higher: protecting staff, patients, and visitors while preserving a culture of compassion, dignity, and service.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2026. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing