Home Search

white house - search results

If you're not happy with the results, please do another search
zero-trust, Counter-Ransomware Meeting , Biden Administration and Tech Giants

U.S. Government to Adopt The Zero-Trust Security Model

The Office of Management and Budget (OMB) in the U.S. released a national strategy to move the government towards a zero-trust security model for better cybersecurity...
Proactive Cybersecurity Paradigm, cyberwar, IoT, 5G, Boardroom, Identity Detection and Response, Predictions, supply chains, hybrid workforce

Shifting from a Reactive to a Proactive Cybersecurity Paradigm

For too long organizations have taken a reactive approach to dealing with threats and breaches. Incident reporting and incident response have been slack. But...
cybersecurity predictions, cyber hygiene

Automating Cyber Hygiene Will Become Increasingly Important

What will Cybersecurity be like in 2022? It is that time of the year when we think about the year gone by and wonder...
supply chain attacks

3 Steps Businesses Can Take to Protect Themselves From Software Supply Chain Attacks

In August, the White House hosted a meeting with some of the most powerful CEOs in the world; from Apple to JPMorgan. The topic...
User Verification Policy, zero trust approach

Securing ‘Digital India’ With a Zero Trust Approach

What are some of the biggest challenges facing countries across the globe today? Technology is transforming human societies and communities across the globe, in...
CISA VDP platform, U.S. export ban on cybersecurity items

U.S. Govt to Control Export of Cybersecurity Items to Regions with Despotic Practices

The Commerce Department's Bureau of Industry and Security (BIS) in the U.S. announced new policies to control the export of cybersecurity items to regions...
JVCKenwood, LockFile ransomware, ransomware attacks in India, Suppress ransomware payment channels

30 Governments Join Hands to Suppress Ransomware Payment Channels

The Virtual Counter-Ransomware Initiative meeting facilitated by the White House National Security Council, to deliberate the efforts to improving national resilience, addressing the misuse...
Gmail, apt28

Russia-linked APT28 Phishes 14,000 Gmail Users in a State-sponsored Phishing Campaign

APT28, a threat group attributed to Russia's General Staff Main Intelligence Directorate (GRU) 85th Main Special Service Center (GTsSS) military unit 26165, is targeting...
Trilateral Security Partnership

Australia, U.K., and U.S. Come Together in a Trilateral Security Partnership

While the cyberthreat landscape is crossing boundaries, multiple nations are coming together to safeguard the cybersecurity landscape. Australia, the U.K., and the U.S. recently...
Harness Your System, Free Decryptor, federal government, cybersecurity

3 Ways the Federal Government Is Using Technology to Advance Cybersecurity

When it comes to cybersecurity, the federal government is putting out fires every day — and it can be exhausting. Like most organizations, the...