A New Directive for Pipeline Operators Puts Cybersecurity in the Spotlight

It’s no secret that cyberattacks against critical infrastructure are increasing. The recent attacks against water treatment plants, pipelines, vital hospital systems and food processing facilities have all made recent headlines and demonstrate the vulnerability of all types of critical infrastructure providers. The attacks have caused chaos, value chain disruption and crippling fuel shortages, and we […]

The post A New Directive for Pipeline Operators Puts Cybersecurity in the Spotlight appeared first on Security Intelligence.

Continue reading A New Directive for Pipeline Operators Puts Cybersecurity in the Spotlight

Public Sector Security Is Lagging — How Can States and Governments Better Defend Against Cyberattacks in 2020?

Malicious cyberattacks against the public sector have made headlines for the past five years, but although the stakes are high, the response from government agencies has not always been adequate.

The post Public Sector Security Is Lagging — How Can States and Governments Better Defend Against Cyberattacks in 2020? appeared first on Security Intelligence.

Continue reading Public Sector Security Is Lagging — How Can States and Governments Better Defend Against Cyberattacks in 2020?

10 Steps to Evaluate Cloud Service Providers for FedRAMP Compliance

Companies that wish to do business with federal government agencies in the cloud must complete these 10 steps to achieve FedRAMP compliance.

The post 10 Steps to Evaluate Cloud Service Providers for FedRAMP Compliance appeared first on Security Intelligence.

Continue reading 10 Steps to Evaluate Cloud Service Providers for FedRAMP Compliance

Government Agencies Must Work With the Private Sector to Bolster Infrastructure Security

To improve infrastructure security per the president’s executive order, government agencies must build trust with the private security industry.

The post Government Agencies Must Work With the Private Sector to Bolster Infrastructure Security appeared first on Security Intelligence.

Continue reading Government Agencies Must Work With the Private Sector to Bolster Infrastructure Security

Cybercrime Without Borders: Bridging Gaps Between Public and Private Sectors to Ensure a Safer Future

Cybercrime affects businesses and government agencies equally, so why shouldn’t the public and private sectors collaborate to secure their critical assets?

The post Cybercrime Without Borders: Bridging Gaps Between Public and Private Sectors to Ensure a Safer Future appeared first on Security Intelligence.

Continue reading Cybercrime Without Borders: Bridging Gaps Between Public and Private Sectors to Ensure a Safer Future

Estonia to Build Off-Site Data Center in Luxembourg

Pending negotiations with Luxembourg, Estonia will become the first nation to build an off-site data center in another country.

The post Estonia to Build Off-Site Data Center in Luxembourg appeared first on Security Intelligence.

Continue reading Estonia to Build Off-Site Data Center in Luxembourg

Building Upon Trump’s Executive Order on Cybersecurity

President Trump’s executive order on cybersecurity sent a powerful message about the real-world implications of information security.

The post Building Upon Trump’s Executive Order on Cybersecurity appeared first on Security Intelligence.

Continue reading Building Upon Trump’s Executive Order on Cybersecurity

100-Day Government IT Roundup: Immigration, Innovation and Information Security in Trump’s America

The state of government IT was a central issue during last year’s election and continues to drive decision-making within Trump’s administration.

The post 100-Day Government IT Roundup: Immigration, Innovation and Information Security in Trump’s America appeared first on Security Intelligence.

Continue reading 100-Day Government IT Roundup: Immigration, Innovation and Information Security in Trump’s America

National Security Requires Real-Time Endpoint Compliance

Federal agencies need to implement a continuous management solution to remain in compliance and prevent cyberthreats from compromising national security.

The post National Security Requires Real-Time Endpoint Compliance appeared first on Security Intelligence.

Continue reading National Security Requires Real-Time Endpoint Compliance

Tracking the Digital Transition in the White House

As part of the digital transition in the White House, former President Barack Obama’s social media records will be transferred to a separate archive.

The post Tracking the Digital Transition in the White House appeared first on Security Intelligence.

Continue reading Tracking the Digital Transition in the White House