sponsored content news
Closing the gaps in cybersecurity resilience at U.S. government agencies
A new survey of IT leaders at civilian, defense and intelligence agencies suggests the threat landscape is evolving quicker than their agencies can respond.
The ‘right’ security conference in the making
Philippe Courtot has launched the CIO/CISO Interchange, an event series aimed at cutting through the noise and getting to what security leaders should be discussing.
Improving cybersecurity visibility and state and local government agencies
Report highlights security gaps in state and local government networks as IT leaders manage an increasing diversity of computing assets.
Tech Brief: The future of mobile innovation in federal government
New mobile technology advances are enabling innovations in immersive training, mobile productivity and security at civilian and defense agencies.
Cybersecurity researchers identify new variants of APT34 malware
A Booz Allen research team developed an advanced technique to detect and block variations of malware infections attributed to suspected nation-state cyber-espionage group.
How to find and remove advanced persistent adware in your network
A unique form of advanced persistent adware recently found by the Booz Allen Dark Labs’ Advanced Threat Hunt team is lurking on enterprise networks and can evade traditional forms of cyberdefenses.
Dark Labs Advance Hunt team identifies adware demonstrating nation-state APT behavior
The Booz Allen Dark Labs’ Advanced Threat Hunt team discovered a unique form of adware lurking on networks that evades all traditional forms of cyber defense.
Tech Brief: Put your mobile strategy to work for agency transformation
Learn how your agency may already have the tools to boost workforce productivity using secure mobile device technology and management tools.
Closing the gaps in federal endpoint security
More than half of government agency IT officials worry about cyberattacks from endpoint devices. Yet many aren't taking advantage of technologies they may already have to reduce their risks.
How identity can control shadow IT
By focusing on identity management, IT departments are able to simplify access to cloud applications, making them more secure.
Information security in the DevOps age: Aligning conflicting imperatives
The explosive growth of software containers has been a boon for agile development; but they can create hidden risks for security pros.
Tech Brief: Leveraging your network to fortify cybersecurity
Using sensor-aware servers, switches, routers and devices not only supports a holistic cybersecurity strategy, but also lowers costs and improves performance.
Podcast: The case for zero-trust networks
The creator behind the zero-trust network model, John Kindervag, talks about why "trust" has become a vulnerability that needs to be mitigated like other vulnerabilities and where to start.
Open source's scalability and flexibility
Henry Sowell, Technical Director for Hortonworks. spoke with CyberScoop on how open source systems allow for that flexibility and scalability, especially at a time where the onslaught of threats has never been greater.
Threat intelligence: The tie that binds
Bryan Geraldo, Anomali’s Director of Customer Success, on how organizations can shift their mindset in order to get the most out of the threat intel they collect on a daily basis.
Position paper: Taking a holistic approach to endpoint security
Yesterday’s solutions can’t solve tomorrow’s problems.