How to enable security operations personnel, CISOs, and CIOs through the expansion of responsibility for whole agency cyber accountability
How to protect agency networks from attackers and deploy security technologies in the cloud, on premise or a hybrid of both
How to better manage the total cost of "good security: ownership" from the technology stack to the investment resources and to the human capital needed to successfully operate and maintain security services
How security plus risk mitigation is the best equation for compliance
What the cyber warriors at the center of the fight are finding to the increasingly sophisticated cyber threats facing the nation
Technology is outpacing our
ability to secure it. Despite
substantial spending on legacy
security products, advanced
attackers are bypassing these
defenses at will and spreading
unchallenged. There’s no single technical answer.
There’s no legislative fix. Bad guys
will always exist, and ...
Today’s security threats are increasingly sophisticated in the ways they target, attack and infiltrate organizations to steal their core assets. Technology alone will not defeat a determined attacker. And it’s difficult and costly to hire, train and retain security experts. You need a trusted pa...
The Russian cyber threat groups that we
monitor frequently design innovative
ways to cover their tracks. In early 2015,
we came across stealthy malware—which we
call HAMMERTOSS—from an advanced
persistent threat group that we suspect the
Russian government sponsors. We designate
Attackers targeted a wide spectrum of industries in 2014, including several that we had
not seen in large numbers before. While organizations learned of breaches sooner than
they did in 2013, attackers still roamed undetected in breached environments far too
long. And fewer victims discovered the...
Mobile devices have become critical in today’s digital workplace. But most organizations lack the security to ensure they, and the data they contain, are secure. Most security teams cannot fully account for—let alone monitor—the vast array of apps that have access to valuable corporate...