More Cybersecurity Articles
The additional responsibilities state and local IT shops have taken on in the wake of the pandemic have stretched their already thin resources, but the work administering hundreds of federal programs may finally open the door for federal cybersecurity funding.
With every point in the infrastructure supply chain being carefully scrutinized, zero trust can help agencies authenticate and manage the onslaught of new devices that need to access secure networks.
Agencies must embrace a TIC 3.0 readiness approach that sets them up for short-term fixes as well as long-term success.
The information derived from a combination of audit trails and detailed forensics can help IT professionals trace and react to threats and even prevent future attacks.
Identity proofing will ensure that relief funds get delivered quickly and accurately and that fraud prevention doesn’t put a burden on the user experience.
Nearly a quarter of vulnerabilities discussed in social media between 2015 and 2017 were discussed on social platforms prior to their addition to the National Vulnerability Database.
The Cybersecurity and Infrastructure Security Agency reminded civilian agencies that they are legally required to use sinkholing capabilities through EINSTEIN 3 Accelerated as their primary upstream DNS resolving service.
Trump administration issued an executive order imposing new restrictions on numerous foreign-made products and technology used in bulk-power systems.
True automation and full transformation of SecOps needs a vision that’s more than adding tools and data streams and recognizes the constraints and strengths of public-sector organizations.
Advanced technologies will help close gaps by correlating threat intelligence and coordinating responses at machine speed.
Sign up for our newsletter.