Unmanned aerial systems remain largely in their infancy, and yet they already threaten defense and intelligence operations: advanced surveillance capabilities of these systems enable adversaries to collect data and information to shape military tactics, and swarming techniques increasingly serve as a means for adversaries to distract, to disorient, and disrupt. Such threats, combined with others … Continue reading Countering the counter-UAS Shortcomings
On February 9, President Barack Obama announced the Cybersecurity National Action Plan (CNAP), which he described as the capstone of more than seven years of determined effort by his administration. The plan builds upon lessons learned from cybersecurity trends, threats, and intrusions. The plan also directs the federal government to take new action and pave … Continue reading Cybersecurity In The Obama Era
If you are making decisions on how to spend the last of your FY 2016 IT budget, there are low-cost, high-impact products and services available that can improve your security status and make your life easier in the coming year.
This week the Tenable blog is focused on higher education, and why summer break is a good time for schools to focus on cybersecurity projects for the coming year. Threat hunting, vulnerability management and the core value of continuous visibility are essential goals that school systems should commit to over the long, hot summer.
This week in NextGov, TWB author John Breeden II answers some of his fan mail, and the most asked question of the day: What the heck is a quantum computer? This week he attempts to explain the weird, quirky and physics-defying world that makes up this fascinating new science, and shows why it has got the government so worried.
Organizations must secure their SCADA networks while enabling access to those who need it. Here are some tips for meeting security requirements for your critical infrastructure.
If you think that quantum computers are the stuff of science fiction, you might be surprised to learn that there are several powerful ones operating right now, and if they realize their full potential, current government encryption levels might not be enough. NIST is even trying to preemptively develop quantum-resistant encryption. Tune into NextGov for the opening shots of the quantum versus encryption war.
Moving beyond periodic certification of information systems to the Risk Management Framework requires standardizing and automating the assessment process.
Summer is the best time for infosec professionals in institutions of higher education to focus on cybersecurity projects: baselining and inventorying, planning regular scans, and implementing new procedures.
Although penetration testing might be viewed as one of the more glamorous jobs in cybersecurity – think of Tom Cruise in Mission Impossible hacking into a CIA computer while dangling horizontally from cables in a heavily protected room – it might come as a surprise to learn that one of the challenges of the profession … Continue reading So You Want To Be A Penetration Tester