CDM Dashboards: A Gateway to Better Intelligence
The Continuous Diagnostics and Mitigation program should be viewed as a catalyst to change how federal agencies think about risk Continue reading CDM Dashboards: A Gateway to Better Intelligence
Collaborate Disseminate
The Continuous Diagnostics and Mitigation program should be viewed as a catalyst to change how federal agencies think about risk Continue reading CDM Dashboards: A Gateway to Better Intelligence
EDR solutions now offer continuous recording of system activity to support full endpoint visibility and real-time queries Continue reading Protecting Defense Department Endpoints: A New Approach
Agencies must understand how the advanced capabilities of the CDM program fit into their broader strategy Continue reading Continuous Diagnostics and Mitigation Phases 3 and 4 Require a Holistic Cyber Approach
Changes are underway to shorten the time needed to recruit new technical talent to government Continue reading How Federal CIO Suzette Kent Is Reimagining the Cyber Workforce
Serving as the next step in the government’s stringent security authorization process FedRAMP has become synonymous with security excellence Continue reading Symantec’s CASB, DLP Solutions Receive “In Process” Designation from FedRAMP
A renewed push needed for a rethink – and a redefinition – how to approach cyber security Continue reading Symantec Government Symposium Redefines the Cyber Conversation
Leaders from government, industry to debate question of redefining cyber security at Symantec Government Symposium Continue reading Security Experts Will Gather to Change the Government Cyber Discussion
As cloud computing changes the government technology landscape, the conversations around security must change as well Continue reading Cloud Computing and the Shifting Role of Cyber Security
Organizations can bolster endpoint security by deploying innovative deception technologies that leave attackers increasingly frustrated – and empty-handed Continue reading How to Get Hackers to Fall for an Old Ruse with a New Spin
There is simply too much data for human analysts to work through and this is where machine learning-based log processing is uncovering hidden threats Continue reading How Machine Learning Gains New Insights from Network Logs