In February of 2023, a United States healthcare provider disclosed that malicious actors breached their network, exfiltrated clinical images and protected health information (PHI) about cancer patients, then published it…
Learn MoreDigital transformation is happening all around us especially in the government space, in our cities and towns, at our state levels and even at the federal level. Now, everything is…
Learn MoreThe United States and EU should align their respective approaches to cybersecurity labeling for IoT products—the U.S. Cyber Trust Mark and the EU’s Cyber Resilience Act (CRA)—via technical standards and…
Learn MoreThe Federal Bureau of Investigation, Cyber National Mission Force, and National Security Agency assess that People’s Republic of China-linked cyber actors have compromised thousands of Internet-connected devices, including small office/home…
Learn MoreIoT and OT security is a very exciting development at Palo Alto Networks. Now, there is significantly more connectivity, digital transformation, and cloud-based use cases in the space on IT…
Learn MoreDuring Fiscal Year 2022 (FY 2022) – from October 1, 2021, through September 30, 2022 –the National Institute of Standards and Technology (NIST) Information Technology Laboratory (ITL) Cybersecurity and Privacy…
Learn MoreThe complexities of today’s IT landscape—think cloud apps, data silos, mobile, IoT, and Big Data—have exposed the limitations of role-based access control (RBAC) solutions, leaving organizations, federal government, and military…
Learn MoreIn this technical white paper, the importance of implementing Zero Trust Architecture is discussed. The growth in cloud computing, Internet of Things (IoT), business partnerships, and remote work has increased…
Learn MoreThe digital battlefield is evolving rapidly, with adversaries leveraging new tactics to exploit expanding attack surfaces. From hidden domains to IoT vulnerabilities, securing military infrastructure demands a shift from traditional…
Learn MoreMuch like every other aspect of our lives, law enforcement is now a digitally driven activity. Every crime has digital evidence, whether it’s a suspect’s cell phone, a witness’s cell…
Learn MoreThis document provides a strategy and a project plan for the Global Community Technology Challenge, a federal smart cities program led by the Smart Connected Systems Division of the Communications…
Learn MoreDid you know the lithium-ion batteries powering e-bikes and scooters are considered hazardous materials? These batteries store a lot of energy and, if not properly maintained, can pose fire risks…
Learn MoreDeep Scan capability delivers unmatched forensic analysis on iOS and Android devices. This advanced feature provides critical visibility into device forensics, including filesystem configurations, active processes, and suspicious applications. Enhance…
Learn MoreThe Federal Bureau of Investigation (FBI), the Cybersecurity and Infrastructure Security Agency, the Multi-State Information Sharing and Analysis Center, and the Department of Health and Human Services are releasing this…
Learn MoreThis Cybersecurity Advisory (CSA) is part of an ongoing #StopRansomware effort to publish advisories for network defenders that detail various ransomware variants and various ransomware threat actors. These #StopRansomware advisories…
Learn More