We wanted to see if the alleged hacking tools the CIA is supposedly using did in fact exist, or if doing things like turning TVs into spy devices was possible. So we loaded up some hacking tools and went to work. Find…
Automation could be the answer to feds dealing with constant attacks, reducing the time from detection to remediation from months to seconds. The basic concept is simple enough, simply using the power of the network itself to counter threats, but the reality…
The recent women’s march on DC showed the limitations of smartphone technology. During a crisis or an emergency, or in this case a massive protest march, cellular service can become overloaded. Here is what we need to do about that.
The growing complexity of IT enterprises and the cyberthreats facing them have eroded governments’ confidence in their ability to assess and mitigate cybersecurity risk, according to the latest Global Cybersecurity Assurance Report Card. The ability to see infrastructure and monitor activity is…
One might expect that having Millennials take over the reins of government would not cause any cybersecurity or IT-related problems. But you would be wrong, according to a new survey from Forcepoint. Find out what hidden minefields await government as the younger…
NextGov asked TWB CEO John Breeden to predict a few of the largest trends that we can expect in the New Year. He got two out of three right last time, so perhaps these will be proven correct as well. Find out…
By: Makoto Mizuyama
Member of the board of directors, FinalCode
The cyberthreat landscape is complex and constantly evolving, and we saw a constant stream of breaches in 2016 ranging from the embarrassing (exposure of email addresses on a fetish website) to the ominous (IoT-based…
TWB CEO John Breeden made three bold predictions in NextGov magazine about what 2016 would hold for government and technology. We go back and check his work, seeing how many of those predictions came true.
Upon winning a government contract, many corporate executives breathe a sigh of relief. But these sighs may now be replaced by moans of frustration upon realizing what it takes to remain compliant with federal cybersecurity standards.
The National Industrial Security Policy Operating Manual…
Change 2 to the National Industrial Security Program Operating Manual will require companies working with classified government information to create a full insider threat program. Despite that burden, it should be embraced in these troubling times.
