Adam Stone writes on technology trends from Annapolis, Md., with a focus on government IT, military and first-responder technologies. The Pentagon plans to change the way it addresses cybersecurity ...
The Defense Department has released its revamped Cyber Security Risk Management Construct to enable more real-time cyber defenses. The construct has five phases that DOD says will help operators ...
Global cyberattacks have risen sharply over the last few years, increasing by 38% in 2022, according to Check Point. Combine this with the increasing cost of a data breach, averaging $9.44 million in ...
Version 2.0 of NIST's Cybersecurity Framework, often cited by financial regulators, provides a structured approach to enhancing an institution's cybersecurity. The federal agency in charge of ...
The US National Institute of Standards and Technology (NIST) has released the latest draft of its well-regarded Cybersecurity Framework (CSF) this week, leaving companies to mull how a few significant ...
Supply chain risks and asset management remain key areas in need of improvement among healthcare’s cybersecurity efforts, according to a recent report benchmarking dozens of organizations. The ...
The U.S. National Institute of Standards and Technology has released a preliminary draft of its Cybersecurity Framework Profile for Artificial Intelligence which provides guidance for the secure ...
Is your organization’s cybersecurity framework able to withstand a new generation of sophisticated attackers? If it isn’t, it’s time to rethink and redesign your approach to cyber risk. Cybersecurity ...
In today's era, cybersecurity increasingly relies on artificial intelligence (AI) to keep up with evolving threats. As businesses integrate more technology into their processes, the risks of data ...
The information technology landscape has significantly changed in recent years in terms of corporate value creation (and performance). Wherever data is stored, the digital revolution has created new ...
Editor’s Note: This is the first in a series on Cybersecurity in Supply Chains by SK Jeong, a University of Tennessee professor and digital supply chain researcher experienced in detecting ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results