Now that hackers use apps as a front end for their attacks, ‘benign’ no longer means what you think it does.
As part of the Vigilant Guard exercise, the Vermont National Guard will provide a cyber exercise range that will simulate an intrusion within a power distribution network.
This year, states have enacted dozens of laws intended to give people greater control over who has access to their private activity and information, including where and how it is collected, stored, shared and used.
While malware often gets hackers into a network, once inside, they use standard networking and admin tools for reconnaissance, lateral movement and exfiltration, a new report says.
The Windows 10 update frequency will require agencies to re-evaluate oversight and controls to prevent risk.
In the public sector, legacy infrastructure complicates any security decision.
Shifting security information and event management applications to the cloud gives IT managers the agility to proactively monitor, identify and respond to threats.
New targets are likely to emerge or expand, and the barrier to entry for threat actors is dropping.
Factom’s solution captures the identification of a device, the manufacturer, available updates, known security issues and granted authorities while adding timestamps for added security.
Over 100 public and private sector organizations gathered to test response and coordination in the event of a cyberattack on the nation’s critical infrastructure.
GCN dig IT Award nominations deadline has been extended to July 21!
A new bill would open DHS' National Cybersecurity and Communications Integration Center to state and local agencies to share cyberthreat info.
The Pentagon's recent pilot program shows just how pervasive the exploitable network vulnerabilities are.
A draft NIST guide urges agencies to plan for recovery as well as prevention.