In February of 2023, a United States healthcare provider disclosed that malicious actors breached their network, exfiltrated clinical images and protected health information (PHI) about cancer patients, then published it…
Learn MoreDigital transformation is happening all around us especially in the government space, in our cities and towns, at our state levels and even at the federal level. Now, everything is…
Learn MoreThe United States and EU should align their respective approaches to cybersecurity labeling for IoT products—the U.S. Cyber Trust Mark and the EU’s Cyber Resilience Act (CRA)—via technical standards and…
Learn MoreThe Federal Bureau of Investigation, Cyber National Mission Force, and National Security Agency assess that People’s Republic of China-linked cyber actors have compromised thousands of Internet-connected devices, including small office/home…
Learn MoreMuch has changed since our first publication of Global Mobile Trends in 2016. Technology has advanced, companies have come and gone, and a pandemic has affected everyone. As ever, the…
Learn MoreIoT and OT security is a very exciting development at Palo Alto Networks. Now, there is significantly more connectivity, digital transformation, and cloud-based use cases in the space on IT…
Learn MoreDuring Fiscal Year 2022 (FY 2022) – from October 1, 2021, through September 30, 2022 –the National Institute of Standards and Technology (NIST) Information Technology Laboratory (ITL) Cybersecurity and Privacy…
Learn MoreThe complexities of today’s IT landscape—think cloud apps, data silos, mobile, IoT, and Big Data—have exposed the limitations of role-based access control (RBAC) solutions, leaving organizations, federal government, and military…
Learn MoreIn this technical white paper, the importance of implementing Zero Trust Architecture is discussed. The growth in cloud computing, Internet of Things (IoT), business partnerships, and remote work has increased…
Learn MoreMuch like every other aspect of our lives, law enforcement is now a digitally driven activity. Every crime has digital evidence, whether it’s a suspect’s cell phone, a witness’s cell…
Learn MoreThis document provides a strategy and a project plan for the Global Community Technology Challenge, a federal smart cities program led by the Smart Connected Systems Division of the Communications…
Learn MoreDid you know the lithium-ion batteries powering e-bikes and scooters are considered hazardous materials? These batteries store a lot of energy and, if not properly maintained, can pose fire risks…
Learn MoreDeep Scan capability delivers unmatched forensic analysis on iOS and Android devices. This advanced feature provides critical visibility into device forensics, including filesystem configurations, active processes, and suspicious applications. Enhance…
Learn MoreThe Federal Bureau of Investigation (FBI), the Cybersecurity and Infrastructure Security Agency, the Multi-State Information Sharing and Analysis Center, and the Department of Health and Human Services are releasing this…
Learn MoreThe Cybersecurity and Infrastructure Security Agency (CISA), National Security Agency (NSA), and Multi-State Information Sharing and Analysis Center (MS-ISAC) have released this joint cybersecurity advisory (CSA) to warn network defenders…
Learn More