The new U.S.-E.U. Privacy Shield, new European data privacy rules, Brexit, and globalization are combining to create interesting times for U.S. companies doing business across borders.
If you are making decisions on how to spend the last of your FY 2016 IT budget, there are low-cost, high-impact products and services available that can improve your security status and make your life easier in the coming year.
This week the Tenable blog is focused on higher education, and why summer break is a good time for schools to focus on cybersecurity projects for the coming year. Threat hunting, vulnerability management and the core value of continuous visibility are essential…
This week in NextGov, TWB author John Breeden II answers some of his fan mail, and the most asked question of the day: What the heck is a quantum computer? This week he attempts to explain the weird, quirky and physics-defying world…
Given the diversity of the nation’s election systems and voting technology, there is no easy fix to ensure security. On the other hand, that diversity makes rigging a national election a significant challenge for would-be attackers.
Organizations must secure their SCADA networks while enabling access to those who need it. Here are some tips for meeting security requirements for your critical infrastructure.
If you think that quantum computers are the stuff of science fiction, you might be surprised to learn that there are several powerful ones operating right now, and if they realize their full potential, current government encryption levels might not be enough.…
With less than six months to the deadline for agencies to implement HTTPS on all public-facing websites, nearly half of .gov sites remain unprotected. Deploying the secure protocol should be one of the easier security mandates for agencies to meet.
Moving beyond periodic certification of information systems to the Risk Management Framework requires standardizing and automating the assessment process.
A suggested phase-out by NIST of SMS for sending one-time passwords has been widely misinterpreted as a threat to two-factor authentication. No need to worry—2FA is not going away and you can still use your mobile phone as a token.