This publication documents the consumer profile of NIST’s Internet of Things (IoT) core baseline and identifies cybersecurity capabilities commonly needed for the consumer IoT sector (i.e., IoT products for home…
Learn MoreIn February of 2023, a United States healthcare provider disclosed that malicious actors breached their network, exfiltrated clinical images and protected health information (PHI) about cancer patients, then published it…
Learn MoreDigital transformation is happening all around us especially in the government space, in our cities and towns, at our state levels and even at the federal level. Now, everything is…
Learn MoreThe United States and EU should align their respective approaches to cybersecurity labeling for IoT products—the U.S. Cyber Trust Mark and the EU’s Cyber Resilience Act (CRA)—via technical standards and…
Learn MoreThis study examines the four building blocks of the metaverse continuum, with analysis from experts and survey data from over 200 government executives. The “Metaverse Continuum” is where many emergent…
Learn MoreCyber threats to critical infrastructure IoT (Internet of Things) and OT (operational technology) represent a significant national security challenge. Recent incidents–such as the ransomware attacks targeting health care and essential…
Learn MoreThis report provides a broad overview of the business models that define Big Tech, including a review of the motivations and environment that surround Big Tech’s operations in finance, with…
Learn MoreMuch has changed since our first publication of Global Mobile Trends in 2016. Technology has advanced, companies have come and gone, and a pandemic has affected everyone. As ever, the…
Learn MoreIoT and OT security is a very exciting development at Palo Alto Networks. Now, there is significantly more connectivity, digital transformation, and cloud-based use cases in the space on IT…
Learn MoreToday’s threats are a result of hybrid attacks targeting both physical and cyber assets. The adoption and integration of Internet of Things (IoT) and Industrial Internet of Things (IIoT) devices…
Learn MoreDuring Fiscal Year 2022 (FY 2022) – from October 1, 2021, through September 30, 2022 –the National Institute of Standards and Technology (NIST) Information Technology Laboratory (ITL) Cybersecurity and Privacy…
Learn MoreThis paper examines six use cases in the manufacturing industry that show how the implementation of an advanced SD-WAN solution helps manufacturers accelerate their digital transformation journey and become a…
Learn MoreIn this technical white paper, the importance of implementing Zero Trust Architecture is discussed. The growth in cloud computing, Internet of Things (IoT), business partnerships, and remote work has increased…
Learn MoreAccess control (AC) is concerned with determining the allowed activities of legitimate users and mediating every attempt by a user to access a resource in the system. The objectives of…
Learn MoreMuch like every other aspect of our lives, law enforcement is now a digitally driven activity. Every crime has digital evidence, whether it’s a suspect’s cell phone, a witness’s cell…
Learn More