Responding and Defending Against IdP Vendor Compromise

Based on Okta’s statement on October 20 regarding a recent security breach, it has been determined that the threat actor successfully gained access to Okta’s customer support system. Once inside the system, the threat actor was able to view files Read More …

Cooperation Across DOD, Private Sector Critical Amid Emerging Cyber Threats

Maintaining a robust defense against emerging cyberthreats requires collaboration and cooperation throughout the Defense Department and across industry partners, a top Pentagon information security executive said today. Principal Deputy Chief Information Officer Leslie A. Beavers warned emerging cybersecurity challenges pose Read More …

Why endpoint management is key to securing an AI-powered future

The chief information security officer (CISO) agenda has a new set of priorities. Hybrid work and the resultant architecture updates, so prevalent at the beginning of the pandemic, are no longer top of mind. Instead, the thinking is focused on Read More …

US Government sets forth Zero Trust architecture strategy and requirements

To help protect the United States from increasingly sophisticated cyber threats, the White House issued Executive Order (EO) 14028 on Improving the Nation’s Cybersecurity, which requires US Federal Government organizations to take action to strengthen national cybersecurity.1 Section 3 of Read More …