How to enable security operations personnel, CISOs, and CIOs through the expansion of responsibility for whole agency cyber accountability
How to protect agency networks from attackers and deploy security technologies in the cloud, on premise or a hybrid of both
How to better manage the total cost of "good security: ownership" from the technology stack to the investment resources and to the human capital needed to successfully operate and maintain security services
How security plus risk mitigation is the best equation for compliance
What the cyber warriors at the center of the fight are finding to the increasingly sophisticated cyber threats facing the nation
Technology is outpacing our
ability to secure it. Despite
substantial spending on legacy
security products, advanced
attackers are bypassing these
defenses at will and spreading
unchallenged. There’s no single technical answer.
There’s no legislative fix. Bad guys
will always exist, and ...
Comprehensive Endpoint Security: As endpoints proliferate, and the bring-your-own-device (BYOD) mentality becomes more pervasive, organizations face rapidly increasing security risks. Older endpoint protection platforms (EPPs) use static blocking to keep out known threats. But as attackers have beco...
Today’s security threats are increasingly sophisticated in the ways they target, attack and infiltrate organizations to steal their core assets. Technology alone will not defeat a determined attacker. And it’s difficult and costly to hire, train and retain security experts. You need a trusted pa...
The Russian cyber threat groups that we
monitor frequently design innovative
ways to cover their tracks. In early 2015,
we came across stealthy malware—which we
call HAMMERTOSS—from an advanced
persistent threat group that we suspect the
Russian government sponsors. We designate