When retiring software, government IT teams need complete, accurate and real-time visibility into their environments to identify which endpoints have the software installed, where it’s actively being used and any vulnerabilities related to it as well as remediation efforts.
Cleaner data and biometric-matching algorithms will deliver improved matching results and limit the number of manual comparisons required.
Old vulnerabilities in enterprise software from Fortinet is allowing advanced persistent threat actors to gain access to government and industry networks.
The Pandemic Entry and Automated Control Environment aims to use the biometric and password metadata on CAC cards and related databases to secure access to sensitive areas.
Agencies that set up a private DNS-over-HTTPS service can ensure that any DNS traffic from users and devices uses agency infrastructure, which allows for improved security, filtering and observability.
The Department of Homeland Security will embark on a series of 60-day sprints to move forward on ransomware and cybersecurity workforce issues as well as defense of industrial control systems, transportation systems and election infrastructure.
The White House plans to create privacy, security and access guidelines for vaccine passports as companies are already rolling out applications.
The National Institute of Standards and Technology has published a draft framework that takes NIST's pre-existing cybersecurity best practices and applies them to the voting equipment and information systems supporting elections.
The Defense Innovation Unit selected Zimperium’s mobile endpoint protection platform to help shore up security of devices accessing DOD’s unclassified applications and data.
Seamlessly integrating self-learning artificial intelligence solutions into existing government security operations centers can deliver optimal automation and orchestration.