Now showing results 1-10 of 84
The Need for Stronger Application Security Testing in Government
A Taxonomy of Digital Threats
This virtual session convened subject matter experts to discuss digital threats and the wider cybersecurity ecosystem. The focus is on the four primary categories of digital threats (financial fraud, attacks on reputation, ...
Simplifying Cybersecurity Strategies to Address Modern Threats
This report suggests that a single, unified cybersecurity platform can help organizations achieve their goals by improving visibility; enabling intelligent automation of detection, prevention and response tasks; and reducing ...
Is Your Government Organization Cyber Resilient?
Getting to Zero Trust: A Practical Guide for State and Local Governments
3 Steps to Stop Employees Taking Cyber Bait
Spotlight on Technology
This report highlights results from a survey of IT decision makers on the importance of, and obstacles to technology innovation. (Note: Access to content may require you to provide an email address or other contact information)
Two-Factor Authentication: A Primer for Today's IT Professional
Two Top Areas to Mitigate Government's Cyber Woes: Part One
NIST Digital Identity Guidelines
These guidelines provide technical requirements for federal agencies implementing digital identity services and are not intended to constrain the development or use of standards outside of this purpose. The guidelines cover ...