Martin Stanley, Senior Advisor for AI in the Office of the Chief Technology Officer at DHS, shares how his agency uses AI to combat cyberattacks.
Posts Tagged: cybersecurity
IT controls consist of the procedures and policies that help ensure that technologies are being used for their intended purposes in a reasonable manner.
The Trusted Internet Connections (TIC) program launched in 2007 to protect the security of federal network connections governmentwide.
During a recent cybersecurity conference, major federal figures expressed worry about threats ranging from China to deepfakes.
Digital workspaces are an integral part of corrections agencies’ missions, but prioritizing unity, contextualization and security are vital.
A zero trust approach to cybersecurity can help agencies strike a balance between carelessness and caution on their networks.
Businesses and urban residents are embracing technological innovation faster than many cities can react. With digital change happening in hyper-speed, urban leaders need to act now to bridge the technology gap between their cities and stakeholders.
While states and localities may feel helpless against the endless onslaught of cyberattacks, there are preventative measures they can take to avoid falling victim.
In 2010, the phrase “a zero trust approach to cybersecurity” emerged to describe continuous monitoring and least privilege access control working together.
GovLoop heard from Academy participants who credit the program for their newfound cyber skills. For now, they will use those skills in their current roles.