Shifting security information and event management applications to the cloud gives IT managers the agility to proactively monitor, identify and respond to threats.
New targets are likely to emerge or expand, and the barrier to entry for threat actors is dropping.
Factom’s solution captures the identification of a device, the manufacturer, available updates, known security issues and granted authorities while adding timestamps for added security.
Over 100 public and private sector organizations gathered to test response and coordination in the event of a cyberattack on the nation’s critical infrastructure.
GCN dig IT Award nominations deadline has been extended to July 21!
A new bill would open DHS' National Cybersecurity and Communications Integration Center to state and local agencies to share cyberthreat info.
The Pentagon's recent pilot program shows just how pervasive the exploitable network vulnerabilities are.
A draft NIST guide urges agencies to plan for recovery as well as prevention.
While there are some similarities between cybersecurity and fraud, traditional cybersecurity monitoring and analytics must evolve in order to identify the fraudulent use of IT systems that may otherwise go unnoticed.
Migrating to cloud architectures could help the Army improve security and bandwidth, according to some Army officials.
The Defense Department’s CIO announced a two-year plan to phase out CAC use on information systems.
Cybersecurity insurance not only helps agencies manage the costs of recovering from a breach, it can also foster better security practices.
With today’s attack vectors making the traditional security model obsolete, microsegmentation offers a way to secure data at the packet level.
The state has improved its security posture by lowering end-user risk and opening communication channels for security concerns.