More Cybersecurity Articles
While reports of large organization suffering from cybersecurity breaches continue to emerge, we believe that comprehensive and customizable end-to-end IT security not only dramatically reduces the risks of being compromised but can also have a tremendous benefit to the institution. ThinkShield goes beyond simple endpoint security, with solutions that create huge efficiencies, streamline IT administration, improve the end-user experience.
Information security research and hacking are creating positive developments for the public and private sectors.
Threat identification, continuous monitoring and security training will help the Defense Department mitigate its cybersecurity vulnerabilities.
Agencies working toward digital transformation and cloud migration should focus less on protecting themselves with infrastructure and more on securing their users and how they interact with data.
Someone tried to hack into the state's blockchain-enabled mobile voting system during the 2018 election cycle.
A House bill proposes the Department of Homeland Security open its stores of technical guidance on cybersecurity mitigation to other federal agencies and the broader public.
Building a knowledge base of adversary tactics and techniques based on the MITRE ATT&CK framework can greatly improve organizations' preparedness and breach response.
Zero trust acknowledges the inherent risks posed by human error -- and offers a specific and fixed solution.
A spike in demand for power caused by a coordinated attack on high-wattage internet-of-things devices could trigger transmission line failures and blackouts, but researchers at Princeton have a solution.
The Real ID Pre-Screening tool vets documents residents need when they apply for a Real ID-compliant driver’s license and passes the data to participating DMV offices.
As DOD modernizes tactical communications, cybersecurity must remain at the forefront of planning and execution.
Sign up for our newsletter.