We wanted to see if the alleged hacking tools the CIA is supposedly using did in fact exist, or if doing things like turning TVs into spy devices was possible. So we loaded up some hacking tools and went to work. Find out what happened next.
Automation could be the answer to feds dealing with constant attacks, reducing the time from detection to remediation from months to seconds. The basic concept is simple enough, simply using the power of the network itself to counter threats, but the reality is a bit more complex.
The recent women’s march on DC showed the limitations of smartphone technology. During a crisis or an emergency, or in this case a massive protest march, cellular service can become overloaded. Here is what we need to do about that.
The growing complexity of IT enterprises and the cyberthreats facing them have eroded governments’ confidence in their ability to assess and mitigate cybersecurity risk, according to the latest Global Cybersecurity Assurance Report Card. The ability to see infrastructure and monitor activity is key to boosting confidence.
One might expect that having Millennials take over the reins of government would not cause any cybersecurity or IT-related problems. But you would be wrong, according to a new survey from Forcepoint. Find out what hidden minefields await government as the younger generation takes over.
NextGov asked TWB CEO John Breeden to predict a few of the largest trends that we can expect in the New Year. He got two out of three right last time, so perhaps these will be proven correct as well. Find out what will be coming down the pipe in government and technology in 2017, only at NextGov.
By: Makoto Mizuyama Member of the board of directors, FinalCode The cyberthreat landscape is complex and constantly evolving, and we saw a constant stream of breaches in 2016 ranging from the embarrassing (exposure of email addresses on a fetish website) to the ominous (IoT-based distributed denial of service attacks) to the manipulative (Russian hacking during … Continue reading Cybersecurity trends for 2017: It’s all about the data
TWB CEO John Breeden made three bold predictions in NextGov magazine about what 2016 would hold for government and technology. We go back and check his work, seeing how many of those predictions came true.
Upon winning a government contract, many corporate executives breathe a sigh of relief. But these sighs may now be replaced by moans of frustration upon realizing what it takes to remain compliant with federal cybersecurity standards. The National Industrial Security Policy Operating Manual (NISPOM) is a perfect example of tightening cybersecurity requirements for federal contractors, … Continue reading Time Crunch: Federal Contractors Scramble to Clear NISPOM Change 2
Change 2 to the National Industrial Security Program Operating Manual will require companies working with classified government information to create a full insider threat program. Despite that burden, it should be embraced in these troubling times.