This report, produced by leading compliance assessor Coalfire, outlines how CrowdStrike Falcon can assist organizations in their compliance efforts with respect to National Institute of Standards and Technology (NIST).
Cloudera SDX provides enterprise-grade security and governance on all data and metadata, with dedicated, integrated interfaces to manage it.
In partnership with reseller partner, CTG Federal, we created this piece based on an interview with Steve Grewal, focusing on data management at the tactical edge, the DoDs data consolidation challenges and opportunities for technology and process improvements.
Learn how Cloudera can help you choose the right stream processing engine for organization's needs by analyzing key technical and operational differentiators between four modern stream processing engines from the Apache open source community.
CIS released the CIS Amazon Web Services (AWS) Foundations Benchmark, intended for system and application administrators, security specialists, auditors, help desk, platform deployment, and/or DevOps personnel who plan to develop, deploy, assess, or secure solutions in Amazon Web Services.
Eight years after former Forrester analyst John Kindervag introduced the Zero Trust model, the concept has hit the mainstream. As current Forrester analyst Chase Cunningham says, 85% of his calls involve zero trust. With the amount of interest in the concept, many organizations are rushing to understand how to implement the zero-trust model. In this guide, we’ll look at the first step to implementing zero trust: asset management.
Today, security professionals face many challenges in cybersecurity asset management, from aggregating disparate data sets to establishing real-time visibility in a fluid environment. Emerging technology, such as IoT deployments, and workplace modernization like BYOD continue to complicate this situation. Organizations must understand the depth and breadth of the devices on their network.
This white paper highlights how automating both device discovery and making VA tools aware of new devices that should be scanned can enforce security policies, increase the ROI of vulnerability scanning investments, and strengthen an organization’s overall security posture.
In this short paper, we’ll look at what constitutes an “unmanaged” device, approaches to discovery, and how continuous data aggregation and correlation helps automate unmanaged device discovery.
Protecting systems and data requires massive defensive vigilance and action on the part of CISOs, CTOs, CIOs and the personnel that work for them at multiple points in the value chain of serving up information systems services to a needy customer base.
This paper intends to examine the information security risks innate to the public sector IT supply chain for software and hardware, and their effect on the integrity and availability of federal IT systems and data. It will also enumerate the various standards and impending bills governing the security of the public-sector supply chain.
Detecting billions of dollars in fraud, tracking population trends across the country, and achieving accelerated savings and safety in federal operations: These are just a few examples of machine learning use cases in the government.