{Summer 2022} Issue
Volume 11 | Number 33
Creating New Value Chains Through Disruptive Cyber Innovations
Over the years, the Department of Defense (DOD) has continued to improve and optimize its capacity and capability to prevent and respond to an ever-increasing number of cyber threats and challenges. These include attributing cyber-attacks to
Securing APIs Through External Attack Surface Management (EASM)
As cybersecurity teams work tirelessly to secure their computing environments and stay ahead of risks, two areas that stand out are external attack surfaces and Application Programming Interfaces (APIs). These two areas are not new but
Three Security Challenges Federal Agencies Can Overcome with SASE, Zero Trust and SSE
New Federal Zero Trust Strategy Requires a New Approach to Create More Trust, Not Less One of the challenges to zero trust adoption that agencies have been wrangling with is the definition. Following Executive Order 14028
Zero Trust and Cryptanalytically Relevant Quantum Computers
Over the past decade, due to the increase of sophisticated cyber threats and the success of malicious cyber threat actors, it has become increasingly clear that perimeter based cyber defenses have not been effective enough to
Cyber Threat Intelligence Shapes the Future of SOC Operations
Cyber threat intelligence is critical for Security Operation Center (SOC) operators because it provides information about the Tactics, Techniques, and Procedures (TTPs) that attackers use to target their organization. This information can help SOC operators map