Security incident identification and remediation are daunting challenges for security teams. Manual processes, multiple cross-team hand-offs, and the proliferation of security tools hinder a team’s ability to quickly assess and remediate vulnerabilities and attacks. A recent CSO study revealed that the average enterprise uses 75 security products. […]
In 2012, the U.S. Office of Management and Budget identified continuous monitoring of federal IT networks as one of 14 Cross-Agency Priority Goals. Subsequently, the Department of Homeland Security established the Continuous Diagnostics and Mitigation program to “support … government-wide and agency-specific efforts to provide adequate, risk-based, and cost-effective cybersecurity.”
[…]Shared services makes more sense now than ever, as the Presidential Cyber Executive Order of May 11, 2017, makes clear: ‘Effective immediately, it is the policy of the executive branch to build and maintain a modern, secure, and more resilient executive branch IT architecture. … Agency heads shall show preference in their procurement for shared IT services, to the extent permitted by law, including email, cloud, and cybersecurity services.’ In today’s environment, federal leaders are looking for permanent reductions in the structural costs of mission-support and administrative functions, so more of their limited resources can be dedicated to
building new capabilities and mission delivery.
Lookout has developed the Mobile Risk Matrix to help organizations understand the components and vectors that make up the spectrum of mobile risk — and to provide data that will help enterprises gain a deeper understanding of the prevalence and impact of mobile threats and vulnerabilities.
[…]Lengthy, manual cybersecurity compliance efforts have been expensive for US government agencies—both in budget and time. The time gap between sampling network configurations and getting audit results inevitably means that the network has changed and the results are no longer valid. Using RedSeal, compliance and audit teams are able to reduce network modeling times from weeks to less than a day, and visualize the current status of their as-built networks, reducing costs, and improving operational tempo—while enhancing the digital resilience of their networks.
[…]During 2015, federal departments collectively reported 77,183 cybersecurity incidents, a 10 percent increase from 2014. Looking ahead, cyberrisks and attacks are rapidly increasing and evolving. In short, more clearly than ever, cybersecurity is everyone’s priority. Despite these increases, however, there does seem to be a silver lining: government is getting better and more capable at […] […]
This paper provides insight to how Tenable addresses the National Institute of Standards and Technology (NIST) Framework for Improving Critical Infrastructure Cybersecurity (CSF), which calls for “a set of industry standards and best practices to help organizations manage cybersecurity risks.”
[…]There are many things you could do to improve your security, but where should you invest your resources? Many organizations are turning to security frameworks for best practices and direction for improving their security program.
[…]Agencies are transforming data management with unified systems that combine distributed storage and computation at limitless scale, for any amount of data and any type, and with powerful, flexible analytics, from batch processing to interactive SQL to full-text search. Yet to realize their full potential, these enterprise data hub architectures require authentication, authorization, audit, and data protection controls.
[…]Archives
- December 2017 (2)
- November 2017 (3)
- October 2017 (5)
- September 2017 (5)
- August 2017 (4)
- July 2017 (5)
- June 2017 (3)
- May 2017 (5)
- April 2017 (9)
- March 2017 (13)
- February 2017 (9)
- January 2017 (7)
- December 2016 (10)
- November 2016 (14)
- October 2016 (17)
- September 2016 (19)
- August 2016 (15)
- July 2016 (16)
- June 2016 (17)
- May 2016 (21)
- April 2016 (21)
- March 2016 (20)
- February 2016 (12)
- January 2016 (14)
- December 2015 (7)
- November 2015 (6)
- October 2015 (6)
- September 2015 (7)
- August 2015 (9)
- July 2015 (8)
- June 2015 (9)
- May 2015 (8)
- April 2015 (8)
- March 2015 (10)
- February 2015 (6)
- January 2015 (6)
- December 2014 (2)
- November 2014 (4)
- October 2014 (6)
- September 2014 (3)
- August 2014 (1)
- July 2014 (6)
- June 2014 (6)
- May 2014 (7)
- April 2014 (5)
- March 2014 (6)
- February 2014 (5)
- November 2013 (2)
- October 2013 (3)
- September 2013 (3)
- August 2013 (1)