This webinar will cover the realities of the Enterprise Mission Assurance Support Service (eMASS): what works well, what does not work, and how to best make it work for you.
CS Digest Section: CSIAC ANNOUNCEMENTS
This webinar will highlight recent success in demonstrating substantial improvements in the accuracy under control-flow and data-oriented attacks in Linux, including malicious code reuse, security bypass, and service abuse. The webinar will also describe exciting future research directions on hardware-assisted fast tracing, anomaly-detection as a service,
An insider threat is a malicious threat to an organization that comes from people within the organization. Learn how to spot some possible indicators of an insider threat.
Ransomware has been around for years, however, CryptoLocker attacks have risen sharply in recent months leaving organizations exposed and contemplating paying for their data. Join us for an in-depth look at ransomware and how you can avoid being the next target.
Learn some helpful tips to make a more secure password.
This webinar will describe Comply to Connect (C2C), an automated Network Access Control (NAC) solution that verifies that an endpoint is authorized and meets security requirements before allowing access to the network. These solutions take a standards-based approach to security and the goal is to always know what devices are on your network and to control
Avoid falling for phishing attempts with these helpful tips.
This webinar will explain in detail the changes contained in SP 800-171 revision 1 and various FAR/DFAR hooks into the document, impacts it has on your organization, and how you can continue to implement its IA guidelines.
What is the difference between a Virus, a Worm, and a Trojan? Don’t know? Find out in this short video.
Incorporating security into the design of components used in the Internet of Things (IoT) is essential for securing the operations of the IoT and the cyber-physical infrastructure upon which society depends. The pervasiveness of the IoT and its part in critical infrastructure requires incorporating security into the design of components from the start. Given