An organization implementing a zero-trust cybersecurity architecture means that no individual, asset, or software is trusted. Instead, every system and person must be authenticated, authorized, and continuously validated as having the right to be accessing what they are using.
Tradeoffs—we all have to make them. In today’s always-on, ever-evolving digital world, some of the most important decisions organizations and consumers must make are the tradeoffs between security and convenience. These choices come under even more scrutiny when they involve government entities making risk judgements that could impact American lives, the economy, and other organizations […]
If anything, the ransomware attack on Kronos drives home the fact that cybersecurity impacts everyone. One critical takeaway from the event is that companies and public sector organizations need to take a holistic approach to cybersecurity. Monitoring only what is occurring within an organization’s own network is no longer enough to prevent an attack. HR […]
Norm Laudermilch, LookingGlass’s Chief Cyber Officer, shares his knowledge and expertise on AI & emerging tech and how agencies can continue to better protect themselves against modern security threats.
Cybersecurity threats at one time came barging in through the front door. Adversaries might be stealthy, in wanting to plant, say, an advanced persistent threat. The point is they produced evidence of their presence. The trick was to find those footprints before they got too far.
During the Defense 1 Tech Summit, Rep. Jim Langevin, (RI-02), United States Congress, Chris Lynch, CEO and Co-Founder, Rebellion Defense, Ylli Bajraktari, Executive Director, National Security Commission on Artificial Intelligence, and Patrick Tucker, Technology Editor at Defense One, discussed the future of defense innovation and development, the role of industry, and how the United States can keep their edge over their adversaries.
During the Defense 1 Tech Summit, Mieke Eoyang, Deputy Assistant Secretary of Defense for Cyber Policy, and Patrick Tucker, Technology Editor at Defense One, discussed the current state of cyber policy and how it relates to national security, democracy, and how the Department of Defense (DoD) plans to prepare against future challenges of cyber warfare.
It is critical to determine which threats are the most relevant to an organization. In our last post in this series, we look at how to identify and prioritize threats to develop and implement mitigations and reduce risk based on the most dangerous threats.