This quarter’s theme is cyber defense—not a new topic, but one where there have been a number of very important recent advances. These advances support the promise of a future…
Learn MoreSomeone in your company gets an email. It looks legitimate, but with one click on a link, or one download of an attachment, everyone is locked out of your network.…
Learn MoreThe COVID-19 pandemic illustrates the challenge of ensuring resilience and continuity in a connected world. Many of the effects of this new breed of crisis can be significantly ameliorated through…
Learn MoreCybersecurity is everyone’s responsibility. A strategy with multiple layers of protection that evolves with time is essential to achieve greater cyber resiliency. As a provider of security, operations, and business…
Learn MoreCyber attacks in the public sector are on the rise. According to a July 2019 report by a Senate homeland security subcommittee, the number of cyberattacks reported by federal agencies…
Learn MoreIn March 2019, pursuant to section 219 of the Federal Power Act (FPA), the Commission issued a Notice of Inquiry seeking comment on the scope and implementation of its electric…
Learn MoreFederal agencies will increasingly use Internet of Things (IoT) devices for the mission benefits they can offer, but care must be taken in the acquisition and implementation of IoT devices.…
Learn MoreDepartment of Defense (DoD) requires proof of CMMC compliance to ensure protection of controlled unclassified information (CUI) from nation-state and nefarious actors, while keeping the supply chain running safely. Is…
Learn MoreCyber hygiene describes recommended mitigations for the small number of root causes responsible for many cybersecurity incidents. Implementing a few simple practices can address these common root causes. Patching is…
Learn MoreThis is a high level summary of 15 Calls to Action in federal cybersecurity culled from the 10th Annual Billington CyberSecurity Summit. Over 75 top experts from around the world…
Learn MoreThe document highlights examples for implementing the Framework for Improving Critical Infrastructure Cybersecurity (known as the Cybersecurity Framework) in a manner that complements the use of other NIST security and…
Learn MoreThe increasing frequency, creativity, and variety of cybersecurity attacks means that all enterprises should ensure cybersecurity risk is getting the appropriate attention within their enterprise risk management (ERM) programs. This…
Learn MoreCellular networks will be transitioning from 4G to 5G, and 5G networks will provide increased cybersecurity protections. This project will identify several 5G use case scenarios and demonstrate for each…
Learn MoreDevice cybersecurity capabilities are cybersecurity features or functions that computing devices provide through their own technical means (i.e., device hardware and software). This publication defines an Internet of Things (IoT)…
Learn MoreThe term “cybersecurity” is commonly associated with the protection of digital data from theft or compromise by hackers. For enterprise customers, however, most data breaches aren’t the result of technology…
Learn More