Taking a people-centric approach to federal cybersecurity
New research from Proofpoint shows that the majority of cyberattacks are activated by users opening a file, clicking a link, or other types of action.
Security controls that verify users and devices protect agencies from insider threats
Zero-trust security practices make it harder for malicious users to move laterally across a system once they have gained access behind the firewall, report says.
Three best practices to reduce insider cyberthreats
A new white paper advises agencies on ways to strengthen insider-threat detection and optimize IT resources in the fight against malicious users.
How cyberthreat intelligence strengthens defense against cyberattacks
A new briefing report advises government IT leaders on how to gain an upper hand against cyber threats by leaning on timely, accurate and relevant information.
Indiana State’s CIO says automation is needed at state and local level
Dewand Neely says that improving automation is key for state and local agencies to share timely information on cyber threats.
TSA’s CISO advises more automation for cybersecurity operations
TSA’s Paul Morris says that automation and strategic planning can reduce response time and information sharing for cyber threats to minutes.