As stated by NIST, Malware, also known as malicious code, refers to a program that is covertly inserted into another program with the intent to destroy data, run destructive or intrusive programs, or otherwise compromise the confidentiality, integrity, or availability...
As described by NIST, vulnerability scanning is a technique used to identify hosts/host attributes and associated vulnerabilities. (Source) Security categorization of information and systems guides the frequency and comprehensiveness of vulnerability monitoring...
Multifactor authentication (MFA) to an information system, as described by The DoD, uses two or more methods of authentication involving something you know (e.g., password); something you have (e.g., a One-Time Password (OTP) generating device like a fob, smart-card,...
Governments are reacting to the increasing cyber threats by introducing various cyber security regulations and standards. Below is a broad set, but not an exhaustive list of international cybersecurity policies, regulations and standards. RegulationsStandards...
The following provides resources for cybersecurity best practices, system configuration benchmarks, implementation guides, sample policies and procedures, and cybersecurity training modules. Benchmarks, Policies, & Guides Training Resources Center for Internet...
The following resources highlights recent cybersecurity news including alerts, threats, vulnerabilities, and malicious activity. AnnouncementsIn the News National Cyber Awareness System The US-CERT Current Activity web page is a regularly updated summary of the most...
The following provides resources on the latest vulnerabilities, exploits and their remediation that has been identified by the NIST Information Technology Laboratory’s National Vulnerability Database (NVD) and Common Vulnerabilities Exposure (CVE) repositories. Cyber...
The cybersecurity threats companies face have dramatically increased as we provide more services online, digitally store data, and rely on suppliers for a variety of information technology services. Recent high-profile incidents involving DIB supplier systems that...