More Cybersecurity Articles
The National Institute of Standards and Technology publication on zero-trust architecture provides a new security architecture model for the fast-changing environment where the enterprise perimeter is dissolving and apps and users are everywhere.
Fraudsters are using phishing campaigns promising pandemic relief payments to lure Americans to fake websites and entice them to hand over their banking credentials.
Municipalities that protect valuable citizen data should prioritize remote-work security strategies to ease potentially crippling burdens on staff and enhance constituent trust.
To secure criminal, medical and financial data for about 4,500 inmates across several facilities, the Delaware Department of Correction relies on a solid data protection strategy.
Computer sensors that monitor temperature, voltage levels and power consumption can quickly detect the power surges that indicate ransomware has started encrypting files.
Agencies can improve their resiliency by establishing and extending trust through every layer of the enterprise -- from the critical hardware infrastructure all the way out to the data on the network.
The quality assurance technique uncovers coding errors and security loopholes during software vulnerability testing and assurance processes.
The Trusted Internet Connection pilots will help flesh out roles and responsibilities for safely navigating government cloud programs, according to the TIC program manager.
Fueled by artificial intelligence, big data and the internet of things, 5G networks will support a global sensor network that can identify multi-dimensional attack vectors and instantly spot discrepancies.
Agencies that deploy crucial defense measures will reinforce an ecosystem of protection that is desperately needed to safeguard data in this time of crisis.
Sign up for our newsletter.