Agencies must invest the time and resources in risk assessments, vulnerability studies, internal skill improvement and data analytics to make increasingly informed decisions about their susceptibility to fraud.
Agencies should cull the security stack and provide contextual visibility across all layers of the environment -- network, endpoint, lateral movement, cloud and IoT.
By proactively conducting threat research, segmenting networks and deploying proper security hygiene, critical infrastructure providers will be better prepared to identify threats, secure networks against them and mitigate any resulting damage.
Los Angeles is reducing its attack surface by training employees and securing connected devices.
The network has become not only a target but also a channel for disruption -- distributing DDoS, phishing, ransomware and other types of malware attacks.
Officials and companies who promote online voting are creating a false sense of security –- and putting the integrity of the election process at risk.
When devices' designs and components are open for public view, downstream customers could verify the security themselves.
To prevent attackers from infiltrating government networks, agencies must secure privileged access, limiting intruders’ ability to move laterally and escalate privileges.
Customs and Border Protection’s biometric entry/exit identification system nabbed two men attempting to cross from Mexico into the U.S. using someone else’s border-crossing cards.
With its ability to secure private information and authorize transactions, blockchain can help restore the public’s confidence in government's digital information management.