As DOD formally extends Zero Trust principles into operational technology environments, agencies must secure machines, sensors and industrial systems without compromising availability or safety.
In July 2025, the Department of Defense issued Directive-Type Memorandum 25-003, formally advancing implementation of the DOD Zero…
How the Industry Is Framing AI
Over the past two years, artificial intelligence has moved from an emerging capability to the dominant narrative in cybersecurity. Nearly every category, from endpoint protection to identity platforms to cloud security, now highlights AI-driven features promising…
Financial services institutions possess vast quantities of valuable data about customers. Naturally, this makes them targets for cyberattackers who seek to pilfer data, extort organizations, and commit cyber fraud.
One solution that has proved to be a big help in extending cyberdefenses and…
Keeping data and its corresponding systems safe for workers is challenging for any IT security team. In the past, I have worked with IT security teams to help categorize which user groups had access to which applications and files as part of…
In higher education, reputation is essential, and nothing shatters a good reputation faster than a high-profile cybersecurity attack that compromises the personal data of students and staff or steals other sensitive or legally protected information. Compounding the challenge of thwarting cyberattacks…
There’s an absence of cybersecurity solutions with Common Criteria certification for network access control (NAC) tools.
On October 15, 2016, the naval commissioning ceremony for the USS Zumwalt will take place in the Port of Baltimore. The USS Zumwalt is not only the newest ship in the U.S. Navy, it represents a new class of warship that takes…
On February 9, President Barack Obama announced the Cybersecurity National Action Plan (CNAP), which he described as the capstone of more than seven years of determined effort by his administration. The plan builds upon lessons learned from cybersecurity trends, threats, and intrusions.
The…
If you are making decisions on how to spend the last of your FY 2016 IT budget, there are low-cost, high-impact products and services available that can improve your security status and make your life easier in the coming year.
This week the Tenable blog is focused on higher education, and why summer break is a good time for schools to focus on cybersecurity projects for the coming year. Threat hunting, vulnerability management and the core value of continuous visibility are essential…
