cybersecurity
Acting on CISA’s advice for detecting Russian cyberattacks
This post explores the 4 key areas outlined in the CISA "Shields Up" memo and examines ways they can be detected with network data.
This post explores the 4 key areas outlined in the CISA "Shields Up" memo and examines ways they can be detected with network data.
Application layer infrastructure visibility in IaaS using a recent Log4Shell example.
OMB’s new memorandum M-22-09 is changing this pattern, and setting deadlines for implementation across the government.