Nathan Eddy works as an independent filmmaker and journalist based in Berlin, specializing in architecture, business technology and healthcare IT. He is a graduate of Northwestern University’s Medill ...
The implication is stark: passive data protection strategies are insufficient. Survival now depends on layered defences that ...
A recent GAO audit report pointed out something that should come as no surprise: federal agencies face several challenges when it comes to cybersecurity. The challenges GAO cited include: Threats from ...
On February 26, 2024, the National Institute of Standards and Technology (NIST) released the NIST Cybersecurity Framework 2.0 (CSF 2.0). CSF 2.0 represents the first major update to the Cybersecurity ...
In this post in our series on basic cybersecurity concepts for lawyers (see here and here for prior posts), we delve into the National Institute of Standards and Technology (NIST) Cybersecurity ...
The NIST Cybersecurity Framework 2.0 is designed to be universally applicable, extending its reach beyond critical infrastructure sectors to encompass all industries. This inclusive approach is a ...
COMMENTARY In the modern enterprise, where IT infrastructure, applications, and data are spread across multiple clouds, hybrid clouds, and on-premises data centers, identity ensures that the right ...
As the digital landscape grows more treacherous, companies are finally beginning to treat cybersecurity as a top operational risk. And for enterprises revising their data security strategies, the ...
User-Created Clip April 18, 2017 2014-02-19T14:05:28-05:00https://images.c-span.org/Files/25d/20140219140636001_hd.jpgPatrick Gallagher of the National Institutes of ...
As the agency’s vulnerability database buckles under a flood of submissions, it’s planning to shift some responsibilities to other parties.
Some results have been hidden because they may be inaccessible to you
Show inaccessible results