
This quarter’s theme is cyber defense—not a new topic, but one where there have been a number of very important recent advances. These advances support the promise of a future…
Learn More
Someone in your company gets an email. It looks legitimate, but with one click on a link, or one download of an attachment, everyone is locked out of your network.…
Learn More
The COVID-19 pandemic illustrates the challenge of ensuring resilience and continuity in a connected world. Many of the effects of this new breed of crisis can be significantly ameliorated through…
Learn More
Cybersecurity is everyone’s responsibility. A strategy with multiple layers of protection that evolves with time is essential to achieve greater cyber resiliency. As a provider of security, operations, and business…
Learn More
Cyber attacks in the public sector are on the rise. According to a July 2019 report by a Senate homeland security subcommittee, the number of cyberattacks reported by federal agencies…
Learn More
Federal agencies will increasingly use Internet of Things (IoT) devices for the mission benefits they can offer, but care must be taken in the acquisition and implementation of IoT devices.…
Learn More
In March 2019, pursuant to section 219 of the Federal Power Act (FPA), the Commission issued a Notice of Inquiry seeking comment on the scope and implementation of its electric…
Learn More
Department of Defense (DoD) requires proof of CMMC compliance to ensure protection of controlled unclassified information (CUI) from nation-state and nefarious actors, while keeping the supply chain running safely. Is…
Learn More
Cyber hygiene describes recommended mitigations for the small number of root causes responsible for many cybersecurity incidents. Implementing a few simple practices can address these common root causes. Patching is…
Learn More
This is a high level summary of 15 Calls to Action in federal cybersecurity culled from the 10th Annual Billington CyberSecurity Summit. Over 75 top experts from around the world…
Learn More
The document highlights examples for implementing the Framework for Improving Critical Infrastructure Cybersecurity (known as the Cybersecurity Framework) in a manner that complements the use of other NIST security and…
Learn More
The increasing frequency, creativity, and variety of cybersecurity attacks means that all enterprises should ensure cybersecurity risk is getting the appropriate attention within their enterprise risk management (ERM) programs. This…
Learn More
Cellular networks will be transitioning from 4G to 5G, and 5G networks will provide increased cybersecurity protections. This project will identify several 5G use case scenarios and demonstrate for each…
Learn More
Device cybersecurity capabilities are cybersecurity features or functions that computing devices provide through their own technical means (i.e., device hardware and software). This publication defines an Internet of Things (IoT)…
Learn More
The term “cybersecurity” is commonly associated with the protection of digital data from theft or compromise by hackers. For enterprise customers, however, most data breaches aren’t the result of technology…
Learn More