Today’s cyberthreats include foreign governments, criminals, hacktivists and terrorists. Their motivations range from financial gain to hurting the U.S.
One of the challenges to keeping government secure comes from how scattered cybersecurity tools, services and governance is. To combat this issue, a concerted effort is being made to consolidate these pieces of the cybersecurity puzzle to patch up holes and make spending more efficient.
In part 1 of this story, we used a bank robbery as a metaphor for a cyberattack. At the end of Part 1, the robbers had made it to the vault. In part 2 we will consider how they break in and how they get the goods back out. Step 4: Breaking into the Vault… Read more »
A focus on some of the cybersecurity threats facing municipalities today.
There’s a popular saying that “numbers never lie.” It has a nice ring to it, but in reality, the adage requires that the numbers share a common language.
Bank robbery as a metaphor for a cybersecurity breach to explain how bad guys get in, how they find valuable information, and how they get out with the goods.
“Insider threat” is an ambiguous phrase, as it denotes any individual with access to an organization’s insider information.
If you fail to deploy high availability strategies for critical applications, it will result in a significant loss – either in downtime, data or your organization’s reputation.
In honor of Cybersecurity Month, we put together this interactive quiz to help you find out what your insider threat level is. Are you red, yellow or green?
Despite challenges from a cybersecurity workforce shortage, some agencies are making progress to improve hiring and employee training.