Commentators are warning of the dangers of the wildly popular game when used on mobile devices for business. But instead of worrying about Pokémon Go, you should have an enforceable policy in place for all apps.
The market for cyber insurance is growing, but this industry has not yet reached the critical mass needed to reform how we protect our information infrastructures.
Vulnerability management is an essential part of government cybersecurity. It requires not only continuous monitoring and visibility to spot vulnerabilities, but also the context needed to prioritize vulnerabilities based on risk so agencies can take effective action to eliminate, patch or mitigate.
NIST is asking industry to help develop a solution to help ensure the integrity of data after a breach or other incident. The effort is being undertaken at NIST’s National Cybersecurity Center of Excellence.
Now two years old, the Cybersecurity Framework will get a few tweaks from NIST, but the community is generally happy with guidelines for securing the nation’s critical infrastructure. Information sharing remains a problem area, however.
Agencies are spending more than ever on maintaining legacy IT. But there was more smoke than fire at this week’s House committee hearing on legacy tech.
As the U.S. power grid becomes increasingly vulnerable to electromagnetic disruptions—both natural and manmade—the clock is ticking toward possibly catastrophic solar storms that some scientists say are inevitable.
The Homeland Security Department’s Continuous Diagnostics and Mitigation (CDM) program can help ensure that your agency has the proper cybersecurity controls in place. The right CDM tools can also help you identify and eliminate threats in your network before they become breaches.