
TrickBot is a modular banking trojan that targets sensitive information and acts as a dropper for other malware. Since June 2019, the MS-ISAC is observing an increasingly close relationship between…
Learn More
5G is not only about “faster, bigger or better” networks. It is about enabling a diverse new set of services and use cases affecting nearly every aspect of our lives.…
Learn More
Prevent signaling threats from Narrowband IoT devices and secure your CIoT services against DoS attacks from weaponized CIoT devices, malware, ransomware, and other vulnerabilities. Palo Alto Networks K2-Series 5G-ready next-generation…
Learn More
Ensuring the integrity and security of the election process is essential for the functioning of democracy in the U.S., and is a shared responsibility among many officials. Local election administrators…
Learn More
5G is an evolving technology that will usher in an age of accelerated innovation connecting people, things and machines, through continuing improvements in mobile wireless communications. This 5G Americas whitepaper…
Learn More
The problems of corporate concentration and privacy on the Internet are inextricably linked. A new regime of interoperability can revitalize competition in the space, encourage innovation, and give users more…
Learn More
As America prepares for distribution of coronavirus vaccine, the security and integrity of facilities that will receive, house, and distribute COVID-19 vaccines has come into focus. Supply chain and cold…
Learn More
FireEye gathers and analyzes considerable amounts of proprietary data from victim, adversary and machine intelligence and sensors worldwide, as well as managed detection and response, incident response and other consulting…
Learn More
In January 2017, DHS designated the infrastructure used to administer the Nation’s elections as critical infrastructure. This designation recognizes that the United States’ election infrastructure is of such vital importance…
Learn More
All organizations are vulnerable to cybersecurity attacks in some way. The common thread among all organizations, including the United States federal government, is the necessity to continuously validate and improve…
Learn More
The increasing trend in building microservices-based applications calls for addressing security in all aspects of service-to-service interactions due to their unique characteristics. The distributed cross-domain nature of microservices needs secure…
Learn More
This publication describes an approach for the development of Information Security Continuous Monitoring (ISCM) program assessments that can be used to evaluate ISCM programs within federal, state, and local governmental…
Learn More
The explicit guidance on the secure use of hyperscale cloudservices was published in January 2018 by four key UK Public Sector Health bodies: NHS Digital, the Department of Health and…
Learn More
Cortex™ AI-based continuous security platform by Palo Alto Networks delivers new levels of simplicity in security operations and significantly improved security outcomes through automation and unprecedented accuracy. The platform solves…
Learn More
The firewall is the foundation of enterprise data security. All firewalls are not created equal, though and no two organizations have the same needs, risks and data flow. You need…
Learn More