The Latest in IT Security

Posts Tagged ‘rules’

It may have been easy for Congress on Friday to approve the Cybersecurity Information Sharing Act (CISA), despite past controversy around it. This bill does not hike federal spending or impose sweeping regulatory rules. Its main feature is something many firms will be happy to get: liability protection if they share information with the government […]

Read more ...

Turn the Cyber Kill Chain against your attacker Created by Lockheed Martin, the “Cyber Kill Chain” model has traditionally been used to describe the evolving stages of a cyber attack. However, if this model is applied to internal security processes it’s possible for an organization to identify a compromise and eliminate threats before they result […]

Read more ...

The #pentagon‘s chief information officer is calling for an international set of “#rules of engagement” for cyber #warfare. “Rules of the road that apply whether you are inside #dod or frankly if you are on your own [computer] system,” explained Terry Halvorsen, the Defense Department’s #cio, at a cyber-security summit in Washington on Thursday. Halvorsen […]

Read more ...


Categories

SUNDAY, FEBRUARY 23, 2025
WHITE PAPERS

Mission-Critical Broadband – Why Governments Should Partner with Commercial Operators:
Many governments embrace mobile network operator (MNO) networks as ...

ARA at Scale: How to Choose a Solution That Grows With Your Needs:
Application release automation (ARA) tools enable best practices in...

The Multi-Model Database:
Part of the “new normal” where data and cloud applications are ...

Featured

Archives

Latest Comments