A draft NIST guide urges agencies to plan for recovery as well as prevention.
While there are some similarities between cybersecurity and fraud, traditional cybersecurity monitoring and analytics must evolve in order to identify the fraudulent use of IT systems that may otherwise go unnoticed.
Migrating to cloud architectures could help the Army improve security and bandwidth, according to some Army officials.
The Defense Department’s CIO announced a two-year plan to phase out CAC use on information systems.
Cybersecurity insurance not only helps agencies manage the costs of recovering from a breach, it can also foster better security practices.
The state has improved its security posture by lowering end-user risk and opening communication channels for security concerns.
With today’s attack vectors making the traditional security model obsolete, microsegmentation offers a way to secure data at the packet level.
Agencies can identify and protect databases from bad actors attempting to use stolen database credentials to appear as legitimate insiders.
Although the information that is lifted from government or corporate networks by criminals is a hot commodity on the dark web, tools are being developed to help officials track their stolen data.
Knowing more about organized cybercriminals and the malware marketplace can help IT managers better defend the enterprise, Kaspersky Lab says.
Frequent, mandatory password changes are not only unnecessary but may in fact be harmful to security, according to studies on the subject.
Instead of looking for the technical attributes of known malware and other exploits, IT managers can quickly and accurately detect active attackers by the things they must do on an unfamiliar network to accomplish their objective.