In a globally connected world, protecting national security is a difficult and complex task. Government and defense installations are all prime targets for cyber-sabotage and cyber-espionage attacks. Pulling relevant data…
Learn MoreNearly all networked devices use the Internet Protocol (IP) for their communications. IP version 6 (IPv6) is the current version of IP and provides advantages over the legacy IP version…
Learn MoreThe U.S. has approximately 6,000 miles of land borders, 95,000 miles of coastline, and more than 300 ports of entry where travelers and cargo are inspected. Securing U.S. border areas…
Learn MoreNon-fungible token (NFT) technology provides a mechanism to enable real assets (both virtual and physical) to be sold and exchanged on a blockchain. While NFTs are most often used for…
Learn MoreGovernment Accountability Office (GAO) was asked to review U.S. efforts to secure international nuclear materials. This report describes the risks to securing international nuclear materials identified by federal officials and…
Learn More“Deep fakes”—a term that first emerged in 2017 to describe realistic photo, audio, video, and other forgeries generated with artificial intelligence (AI) technologies—could present a variety of national security challenges…
Learn MoreIn the latest Secure by Design initiative, CISA emphasizes that software security must be a priority from the very start of development. This guidance outlines the most critical bad practices…
Learn MoreEarnings for active duty military service or active duty training have been covered under Social Security since 1957. If you served in the military before 1957, you didn’t pay Social…
Learn MoreEstablished in early 2003, the Department of Homeland Security (DHS) is the “youngest” cabinet-level department of the U.S. government and has a broad and complex mission. This report is intended…
Learn MoreGovernment agencies support critical missions and must ensure the highest security standards in their cloud environment. However, as agencies move to the cloud, they often face a lack of visibility…
Learn MoreAs the government rapidly adopts cloud technologies, the number of potential attack targets across various cloud environments and architectural frameworks are increasing. Increasing visibility into the entire cloud ecosystem is…
Learn MoreManufacturers are increasingly targeted in cyber-attacks. Small manufacturers are particularly vulnerable due to limitations in staff and resources to operate facilities and manage cybersecurity. Security segmentation is a cost-effective and…
Learn MoreSecurity officers are the backbone of every national security organization. Often the unsung heroes keep both classified information and proprietary information safe, they play a vital and required role in…
Learn MoreThe Cybersecurity and Infrastructure Security Agency (CISA) has frequently identified virtual private network (VPN) solutions that have been involved in many recent high-profile incidents, both with cyber criminals and nation-state…
Learn MoreDisasters are resulting in unprecedented levels of destruction across the world. These shocks and disruptions affect the functioning and sustainability of agricultural production and threaten the livelihoods of millions of…
Learn More