4 Keys to Successful Cyberdefense Automation
12/31/19 Automation can reduce the need to perform mundane tasks, improve efficiency, and create a more agile response to threats. For example, administrators can use artificial in…
12/31/19 Automation can reduce the need to perform mundane tasks, improve efficiency, and create a more agile response to threats. For example, administrators can use artificial in…
12/24/19 Data from the Center for Strategic and International Studies paints a sobering picture of the modern cybersecurity landscape. The CSIS, which has been compiling data on cy…
12/17/19 According to the SolarWinds 2019 Cybersecurity Survey, cybersecurity threats are increasing—particularly the threat of accidental data exposure from people inside the agen…
12/03/19 The Continuous Diagnostics and Mitigation (CDM) Program, issued by the Department of Homeland Security (DHS), goes a long way toward helping agencies identify and prioriti…
10/08/19 A recent federal cybersecurity survey by SolarWinds found federal IT professionals feel threats posed by careless or malicious insiders or foreign governments are at an al…
09/24/19 The Navy’s new Combat to Connect in 24 Hours (C2C24) is an ambitious program with the potential to change naval warfare as we know it. The program is designed to improve o…
08/27/19 Read part one here. Technology: Providing the Necessary Visibility Cybersecurity personnel can’t succeed without the proper tools, but many of them don’t have the technolo…
08/20/19 The Trump administration issued two significant reports in the last couple of months attesting to the state of the federal government’s cybersecurity posture. The Federal …
07/30/19 The rising numbers of data breaches should come as no surprise to federal IT security pros who work every day to ensure agency information is secure. However, these breach…
07/16/19 While there is no one single solution to guard agencies against all cyberthreats, there are tools that can certainly go a long way toward managing and understanding the cy…
05/08/19 More importantly, most common types of cyberattacks can be prevented with foundational controls. I’m willing to bet that most small- to medium-sized businesses (SMBs) don’…
02/20/19 Someone steals credentials from one of your client’s executives. They guess the username and password to their email account. From there, the cybercriminal can send out ta…