Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
Home » Topics » Sectors » Government: Federal, State and Local

Government: Federal, State and Local
Government: Federal, State and Local RSS Feed RSS

Kauai's bubble system moves forward as contingency plan

Is Kauai's travel bubble unnecessary?

September 22, 2020

Kauai's original hotel bubble involving several island resorts for COVID-19 safety has been put to the side after Gov. David Ige’s announced this week that as of Oct. 15 Hawaii will start admitting trans-Pacific travelers who record one negative COVID-19 test within three days of arrival, eliminating the need for resort bubbles. However, at least two high-end Kauai resorts will move ahead with establishing themselves as “bubble” hotels despite the Governor's decision.


Read More
Singapore implement facial recognition for government identity program

Singapore announces first government use of facial verification tech for national identity program

September 22, 2020

Four million Singaporeans can now access digital government services online using facial verification under the National Digital Identity program. 


Read More
DOJ and Marshals service to implement facial recognition for prisoner identification

DOJ is looking into facial recognition for agent devices to identify prisoners

September 18, 2020

The U.S. Marshals Service, charged with moving prisoners around the nation, released a request for quotes to build a facial recognition tool into its agents’ smart devices to help identify prisoners during transfer.


Read More
Can the voting process be hacked? Yes it can.

Can the voting process be hacked?

Carnell Council
Carnell Council CISSP
September 17, 2020

The term "Kill Chain Methodology" or "Cyber Kill Chain" has been widely used in the world of cybersecurity to interpret the different stages involved in a cyberattack. In a nutshell, from a hacker's perspective, a kill chain is a way to illegally gain access to a network or network device via a series of progressive steps. Consequently, from a defender's perspective, every stage of this process presents an opportunity to prevent intrusions. So, what kind of systems, networks or devices can hackers exploit by employing this methodology? Let's talk about the election.


Read More
New Orleans uses video technology to surveil illegal dumping activity

City of New Orleans uses video surveillance to tackle illegal dumping

September 17, 2020
Illegal dumping is a problem in many cities around the world and enforcing laws to prevent it can be quite difficult and resource-intensive. New Orleans has taken a technology-based approach to tackling the problem, and it's working.
Read More
new study says public-private partnerships best way to cybersecure governments

More than 80% of government cybersecurity leaders say private-public partnerships a necessity

September 17, 2020
According to a new report, public-private collaboration would help government leaders keep pace with cyberthreats.
Read More
Tennessee election committee focusing on video surveillance and physical security for November election

Tennessee county to focus on physical security for November election poll sites

September 17, 2020

The Hamilton County Election Commission in Tennessee plans to utilize money from the Federal Cares Act to focus on physical security in time for the November election.


Read More
SEC0918-cyber-feature-slide1_900px

Chinese Ministry of State Security-affiliated cyber threat actor activity targeting US agencies

September 15, 2020
The Cybersecurity and Infrastructure Security Agency (CISA) has consistently observed Chinese Ministry of State Security (MSS)-affiliated cyber threat actors using publicly available information sources and common, well-known tactics, techniques, and procedures (TTPs) to target U.S. Government agencies.
Read More
delaware department of corrections opens intelligence security center for situational awareness

Delaware's Department of Corrections opens Intelligence Operations Center

September 14, 2020

Delaware's state correctional leaders opened the Department of Correction Intelligence Operations Center (IOC). The statewide facility will be operated by the Special Operations Group within the Bureau of Prisons. The IOC positions will allow the DOC to identify security threats from across facilities, assess them, and proactively act to mitigate those risks.

 


Read More
Portland oregon bans public and private use of facial recognition

Portland passes strict facial recognition technology ban

September 14, 2020

In Oregon, the Portland City Council passed legislation, which bans both city government agencies and private businesses from using facial recognition technology on the city’s grounds.


Read More
Previous 1 2 … 63 64 65 66 67 68 69 70 71 … 147 148 Next
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

Popular Stories

Iran on map

Iran Conflict and Cybersecurity: What to Expect in the Next 30 Days

World Cup trophy beside goal

World Cup Safety and Security Is About More than Just Crime

Woman in suit

Can the Industry Do More for Women in Security?

Art museum

Object-Specific Protection: The Non-Negotiable Foundation of Art and Asset Security

NYPD car

Explosives Thrown in Attempted Terrorist Attack Near NYC Mayor’s Home

SEC 2026 Benchmark Banner
SEC 2026 Benchmark Banner

Events

April 8, 2026

The Future of Executive Protection: Layering Technology, Intelligence, and Response

Digital threats to executives and other high-profile employees are evolving faster than most corporate protection programs. Learn why modern executive protection programs require data-driven, intelligence-led strategies to keep pace with the magnitude of today’s threats.

April 15, 2026

How AI is Closing the Decision Gap in Leading GSOCs

Learn how modern security teams are evolving from alert-driven workflows to outcome-driven operations and how AI is enabling faster, more confident decisions at every stage of the incident response lifecycle.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products
SEC 2026 Top Cybersecurity Leaders

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2026. All Rights Reserved BNP Media, Inc. and BNP Media II, LLC.

Design, CMS, Hosting & Web Development :: ePublishing