Government Cybersecurity Processes Must Change Drastically to Keep Up With Complex Attack Vectors

Most organizations today have multiple attack vectors that require monitoring and defending. Government cybersecurity teams, in comparison, have to manage countless additional entry points for threat actors. While most industries must understand and defend against attacks from vendors, satellite offices, wireless networks and bring-your-own-device (BYOD) threats, governments also have to…

Read More

Top 2019 Cybersecurity Predictions From the Resilient Year-End Webinar

2018 was another significant year for the cybersecurity industry, with sweeping changes that will impact security professionals for years to come. The General Data Protection Regulation (GDPR) finally went into effect, dramatically reshaping the way companies and consumers manage data privacy. Security teams stepped up their battle against technology complexity…

Read More

The Cyber Attribution Dilemma: 3 Barriers to Cyber Deterrence

Given that the most serious threats in cyberspace are other state actors and their proxies, traditional thinking is focused on deterrence. Yet there are significant challenges for cyber deterrence. The concept of deterrence was originally developed during the rise of nuclear technology. It relies on second-strike capabilities of opponents and…

Read More

There Is No Perfect Time to Tackle Security Tasks, So Don’t Wait Until It’s Too Late

When it comes to security program management, time is of the essence. Threats need quick attention, incidents require rapid response and confirmed breaches must be dealt with promptly. Less urgently — but equally crucially — security teams must complete vulnerability and penetration testing, remediate issues uncovered during previous assessments, and…

Read More