cyberthreats

Taking a people-centric approach to federal cybersecurity

by • 2 months ago

New research from Proofpoint shows that the majority of cyberattacks are activated by users opening a file, clicking a link, or other types of action.

Security controls that verify users and devices protect agencies from insider threats

by • 2 years ago

Zero-trust security practices make it harder for malicious users to move laterally across a system once they have gained access behind the firewall, report says.

Three best practices to reduce insider cyberthreats

by • 2 years ago

A new white paper advises agencies on ways to strengthen insider-threat detection and optimize IT resources in the fight against malicious users.

How cyberthreat intelligence strengthens defense against cyberattacks

by • 2 years ago

A new briefing report advises government IT leaders on how to gain an upper hand against cyber threats by leaning on timely, accurate and relevant information.

Indiana State’s CIO says automation is needed at state and local level

by • 2 years ago

Dewand Neely says that improving automation is key for state and local agencies to share timely information on cyber threats.

TSA’s CISO advises more automation for cybersecurity operations

by • 2 years ago

TSA’s Paul Morris says that automation and strategic planning can reduce response time and information sharing for cyber threats to minutes.

TwitterFacebookLinkedInRedditGoogle Gmail