As new members join, security management teams must get ahead of the insider threat.
What steps can be taken to protect the organization's crown jewels, or known and unknown assets?
Lone offenders, the internet and social media are the biggest correlations between domestic and international terrorism. So why have Foreign Intelligence Surveillance Act (FISA) orders dropped by more than half in the last two years?
Insider threats can cause extensive damage to national security. To combat this threat, the U.S. must update and adapt current security practices, including the background check process.
Security leaders who protect public facilities and events should employ a mix of access control, surveillance and crowd monitoring to secure public gatherings, according to a recent information session from the Cybersecurity and Infrastructure Security Agency (CISA).
CISA published the second version of Cloud Security Technical Reference Architecture (TRA), which seeks to guide agencies’ secure migration to the cloud by defining and clarifying considerations for shared services, cloud migration and cloud security posture management.
The Federal Rotational Cyber Workforce Program Act of 2021 and the State and Local Government Cybersecurity Act of 2021 will promote cybersecurity on the national, state and local levels.