Recent attacks on defense contractors have degraded the federal government’s supply chains. To better protect supply chains, the federal government is encouraging many agencies and contractors to achieve cyber resiliency.…
Learn MoreAs new security threats emerge and tech stacks get more complex, protecting sensitive data presents a challenge for Federal Government agencies tasked with meeting and maintaining security and regulatory requirements.…
Learn MoreMalicious cyber actors are realizing the potential in exploiting legacy identity, credentials, and access management (ICAM) systems. Lateral attacks, insider threats, and credential theft are becoming increasingly common and threatening…
Learn MoreApplications are the way that users access and manage data, which makes application security an essential component of a broader cybersecurity strategy. If applications are not built securely, then the…
Learn MoreIn recent years, modern communication and collaboration have been drastically altered across the United States, including the federal government. This new working environment now consists of video meetings, phones, webinars,…
Learn MoreRecent attacks on hospital networks, global logistics systems and even democratic elections pose a fundamental threat to public safety and governance. High-speed advances in generative AI and “deepfakes” mean ransomware…
Learn MoreEndpoint management is crucial in helping federal agencies ensure that all endpoints are secure and up-to-date with the latest security patches, reducing the risk of cyberattacks and data breaches. The…
Learn MoreThe increasing use of communication technologies relying on complex data, technology, communication, and interconnectivity has expanded attack surfaces and increased the potential risk of malicious exploitation. The Department of Homeland…
Learn MoreThe characteristics of genomic data compared to other high value datasets raises some correspondingly unique cybersecurity and privacy concerns that are inadequately addressed with current policies, guidance documents, and technical…
Learn MoreCybersecurity should be integral to every business line, function, product and service. Organizations must aim to ensure that cybersecurity is ubiquitous across the digital enterprise and woven into strategy, development…
Learn MoreDue to growing cybersecurity infrastructure and increasingly sophisticated cybersecurity threats, continuous monitoring of information security systems through automation is the best way to accurately assess vulnerability across a complex threat…
Learn MoreEstablishing a robust cybersecurity program that protects an organization against the modern threats we see today is essential. This will ensure that an enterprise is protected from harm and resilient…
Learn MoreThe goal of this primer is to support United States Agency for International Development (USAID) Democracy, Human Rights, and Governance (DRG) personnel, as well as the broader DRG community, to…
Learn MoreThe National Security Strategy will position the United States and its allies and partners to build a digital ecosystem together, making it more easily and inherently defensible, resilient, and aligned…
Learn MoreCreating adequate talent pipelines for the cybersecurity workforce is an ongoing priority for the federal government. Understanding the effectiveness of current education initiatives will help policymakers make informed decisions. This…
Learn More