Preparing for Post-Quantum Cryptography
Quantum computing poses one clearly identified threat — the ability to compromise nearly all current digital encryption. Here’s how to prepare today.
Quantum computing poses one clearly identified threat — the ability to compromise nearly all current digital encryption. Here’s how to prepare today.
Confronting a growing number of alerts and tighter resources, government agencies must evaluate their existing security deployments in endpoint prevention, detection, and response for opportunities to reduce costs and leverage the right technology for more efficient endpoint security. Let’s explore a few best practices that can drive new levels of security efficiency in endpoint securityRead… Read more »
In light of sophisticated new cyber threats, the federal government needs to rethink how it secures key systems, improves efficiency and reduces tool sprawl.
Cascading risks are reshaping the way governments must think about resilience. Agencies can no longer rely on single-event continuity planning.
Resilience has been the government standard for decades, but bouncing back is no longer enough. Regeneration offers a new path forward.
In this video interview, Styrk AI’s Anhad Singh, joined by researcher and author Dr. Donnie Wendt, discuss key issues that agencies must address to ensure safe and responsible AI.
Shadow AI is already at work. But leaders can turn hidden risk into innovation by launching AI amnesty programs andcentral model registries.
In this video interview, Cloudera’s Carolyn Duby discusses how agencies can bring better discipline to managing their cyber data and using it to strengthen their defenses.
NIST’s new SA-24 control sets formal requirements for cyber resiliency, but fails to address the leadership, cultural, and organizational dynamics needed.
In this video interview, Matthew Shallbetter at Armis explains how CDM data modernization could reshape cyber efforts.