Anti-Malware

As stated by NIST, Malware, also known as malicious code, refers to a program that is covertly inserted into another program with the intent to destroy data, run destructive or intrusive programs, or otherwise compromise the confidentiality, integrity, or availability...

Vulnerability Scanning

As described by NIST, vulnerability scanning is a technique used to identify hosts/host attributes and associated vulnerabilities. (Source) Security categorization of information and systems guides the frequency and comprehensiveness of vulnerability monitoring...

Multi-Factor Authentication

Multifactor authentication (MFA) to an information system, as described by The DoD, uses two or more methods of authentication involving something you know (e.g., password); something you have (e.g., a One-Time Password (OTP) generating device like a fob, smart-card,...

International Regulations and Standards

Governments are reacting to the increasing cyber threats by introducing various cyber security regulations and standards. Below is a broad set, but not an exhaustive list of international cybersecurity policies, regulations and standards. RegulationsStandards...

Readiness

The following provides resources for cybersecurity best practices, system configuration benchmarks, implementation guides, sample policies and procedures, and cybersecurity training modules. Benchmarks, Policies, & Guides Training Resources Center for Internet...

Cyber Announcements

The following resources highlights recent cybersecurity news including alerts, threats, vulnerabilities, and malicious activity. AnnouncementsIn the News National Cyber Awareness System The US-CERT Current Activity web page is a regularly updated summary of the most...

Latest vulnerabilities, exploits, and remediation

The following provides resources on the latest vulnerabilities, exploits and their remediation that has been identified by the NIST Information Technology Laboratory’s National Vulnerability Database (NVD) and Common Vulnerabilities Exposure (CVE) repositories. Cyber...

US Regulations and Standards

The cybersecurity threats companies face have dramatically increased as we provide more services online, digitally store data, and rely on suppliers for a variety of information technology services. Recent high-profile incidents involving DIB supplier systems that...