A cybersecurity system called in-toto, which the government paid to develop but never required, might have protected against the SolarWinds hack.
If the Einstein intrusion detection system was unlikely to have detected the malware that was delivered via the SolarWinds Orion update, how can it be fixed?
The Transportation Security Administration is working with Delta Airlines and the Detroit Metropolitan Wayne County Airport to test a touchless system that verifies a domestic passenger’s digital identity with customer’s passport number, TSA PreCheck membership and a live photo.
The state auditor’s software procurement principles are designed to help agencies review applications for privacy violations and potential algorithmic bias.
Until the U.S. gets serious about supply chain management generally, and cybersecurity specifically, the nation will be unable to shift its thinking from “just in time” to “just in case.”
A wireless device detection system that scans facility airspace 24/7 can help agencies enforce policies and defend against a wide variety of threats, ranging from rogue state actors to employees bringing in their own wireless access points.
The best strategy would be not to prevent systems from being breached, but to limit the damage and speed the recovery when they are broken into.
By understanding their own traffic and how it is tied to their employees’ and end users’ needs, agencies can use TIC 3.0 to strengthen network security while improving the speed, efficiency and cost-effectiveness of the organization.
The ABAC model simplifies authorization requirements, provides a more flexible IT architecture and saves significant development time.
The Cybersecurity and Infrastructure Security Agency Emergency wants insight on evolving technologies that can provide secure priority voice, data and information services across all types of existing networks, under all conditions.
With attacks on connected infrastructure are becoming more frequent and sophisticated, securing the internet of things has become even more critical.
By reducing complexity with a unified platform and leveraging a zero-trust approach, IT teams can reduce risk and act quickly to efficiently manage and secure the environment anywhere endpoints exist.
The Cybersecurity and Infrastructure Security Agency has introduced an awareness campaign to reduce the threat of ransomware to public- and private-sector organizations.
A combination of user behavior analysis and identity attributes and privileges can surface anomalous activity, set off alerts and prompt response and mitigation.