As agencies roll out cloud-first policies, three key practices can expose security risks and safeguard both personnel and data.
A new survey from Deloitte and NASCIO shows how state governments are managing cybersecurity demands.
Agencies must invest the time and resources in risk assessments, vulnerability studies, internal skill improvement and data analytics to make increasingly informed decisions about their susceptibility to fraud.
Agencies should cull the security stack and provide contextual visibility across all layers of the environment -- network, endpoint, lateral movement, cloud and IoT.
By proactively conducting threat research, segmenting networks and deploying proper security hygiene, critical infrastructure providers will be better prepared to identify threats, secure networks against them and mitigate any resulting damage.
Los Angeles is reducing its attack surface by training employees and securing connected devices.
The network has become not only a target but also a channel for disruption -- distributing DDoS, phishing, ransomware and other types of malware attacks.
Officials and companies who promote online voting are creating a false sense of security –- and putting the integrity of the election process at risk.
When devices' designs and components are open for public view, downstream customers could verify the security themselves.
To prevent attackers from infiltrating government networks, agencies must secure privileged access, limiting intruders’ ability to move laterally and escalate privileges.