In February of 2023, a United States healthcare provider disclosed that malicious actors breached their network, exfiltrated clinical images and protected health information (PHI) about cancer patients, then published it…
Learn MoreDigital transformation is happening all around us especially in the government space, in our cities and towns, at our state levels and even at the federal level. Now, everything is…
Learn MoreThe United States and EU should align their respective approaches to cybersecurity labeling for IoT products—the U.S. Cyber Trust Mark and the EU’s Cyber Resilience Act (CRA)—via technical standards and…
Learn MoreCyber threats to critical infrastructure IoT (Internet of Things) and OT (operational technology) represent a significant national security challenge. Recent incidents–such as the ransomware attacks targeting health care and essential…
Learn MoreThe Federal Bureau of Investigation, Cyber National Mission Force, and National Security Agency assess that People’s Republic of China-linked cyber actors have compromised thousands of Internet-connected devices, including small office/home…
Learn MoreMuch has changed since our first publication of Global Mobile Trends in 2016. Technology has advanced, companies have come and gone, and a pandemic has affected everyone. As ever, the…
Learn MoreIoT and OT security is a very exciting development at Palo Alto Networks. Now, there is significantly more connectivity, digital transformation, and cloud-based use cases in the space on IT…
Learn MoreDuring Fiscal Year 2022 (FY 2022) – from October 1, 2021, through September 30, 2022 –the National Institute of Standards and Technology (NIST) Information Technology Laboratory (ITL) Cybersecurity and Privacy…
Learn MoreIn this technical white paper, the importance of implementing Zero Trust Architecture is discussed. The growth in cloud computing, Internet of Things (IoT), business partnerships, and remote work has increased…
Learn MoreMuch like every other aspect of our lives, law enforcement is now a digitally driven activity. Every crime has digital evidence, whether it’s a suspect’s cell phone, a witness’s cell…
Learn MoreThis document provides a strategy and a project plan for the Global Community Technology Challenge, a federal smart cities program led by the Smart Connected Systems Division of the Communications…
Learn MoreDid you know the lithium-ion batteries powering e-bikes and scooters are considered hazardous materials? These batteries store a lot of energy and, if not properly maintained, can pose fire risks…
Learn MoreThis paper describes the progress scientists have made in replacing critical elements in various components of lithium-ion batteries to improve their performance and safety while using more sustainable, widely available,…
Learn MoreDeep Scan capability delivers unmatched forensic analysis on iOS and Android devices. This advanced feature provides critical visibility into device forensics, including filesystem configurations, active processes, and suspicious applications. Enhance…
Learn MoreThe Federal Bureau of Investigation (FBI), the Cybersecurity and Infrastructure Security Agency, the Multi-State Information Sharing and Analysis Center, and the Department of Health and Human Services are releasing this…
Learn More