Every day, more and more new malware threats appear—and organizations worldwide scramble to react. The situation is chaotic, if not entirely overwhelming. Of course, part of a good cybersecurity ...
Leeron is a New York-based writer who specializes in covering technology for small and mid-sized businesses. Her work has been featured in publications including Bankrate, Quartz, the Village Voice, ...
Despite more than a decade of talk, the seminal concept in cybersecurity of zero trust — the assumption that no user or device on a computer network can be trusted — hasn’t been implemented nearly as ...
State and local agencies rely on multiple tools and vendors for cybersecurity. In a new CDW proprietary research report, 68 percent of respondents say they operate between 10 and 49 security tools or ...
Maryland is working to improve its cybersecurity with new policies and plans, including efforts to better collaborate with internal state agencies. The state’s central IT shop recently released a ...
The draft policy creates a new framework for secure network boundaries at a time when the tech sector is moving away from boundaries altogether. Federal agencies will soon have new guidance on how to ...
The days of walling off the outside world to protect your network are quickly going the way of the Dodo. Thanks to the extraordinary growth of remote workforces, the adoption of cloud-based networking ...
Higher education institutions are vulnerable to cyberthreats because of the valuable data they store, including student records, research and financial information. The open nature of academic ...
Most CISOs recognize the improved security posture zero trust will bring. But cultural and technological changes make for an arduous path that takes business savvy and technical acumen to navigate.
Adam Stone writes on technology trends from Annapolis, Md., with a focus on government IT, military and first-responder technologies. Internet-connected medical devices represent a fast-growing ...
Tanya Candia is an international management expert, specializing for more than 25 years in information security strategy and communication for public- and private-sector organizations. Businesses ...