Solutions for Cybersecurity Gaps and Challenges -- S&T Has Tech for That!

| April 26, 2016

article image
Earlier this month, the Department of Homeland Security Science and Technology Directorate (S&T) Cyber Security Division (CSD) hosted the Transition to Practice (TTP) Investors, Integrators and IT Company (I3) East Technology Demonstration Day, to showcase technologies to private industry cybersecurity investor, integrators and IT professionals. The event included presentations from Department of Energy (DOE) and Department of Defense (DOD) national laboratory researchers, as well as live in-depth demonstrations of the technologies.“These TTP Technology Demonstration Day events allow us to connect with people in the private sector to build relationships that promote pilots and licensing for promising technologies,” said CSD TTP Program Manager Michael Pozmantier. “During these events, we have the ability to demonstrate technologies directly to the stakeholders who could potentially use the technologies once they become products.”

Spotlight

xandora.net

Xandora.net is a tool for analyzing the behavior of Windows PE-executables with a special focus on the analysis of malware. Xandora provides a detailed report that contains enough information to give a security analyst or researcher what they need to know about the purpose and the actions of the analyzed binary. The generated report includes detailed data about modifications made to the Windows registry or the file system or other processes and of course it logs all generated network traffic. The analysis is based on running the binary in an emulated environment and watching. Xandora scores each analyzed file with an X-Score that indicates the degree of maliciousness. The results from Virustotal are also provided in the report to quickly identify if the file is known and AV signatures already available.

OTHER ARTICLES

DOCUMENT PROOFREADING AND EDITING SERVICES FOR YOUR CYBERSECURITY POLICY

Article | June 14, 2021

Recent data breaches, ransomware, and malware trends have increased the need to protect customer privacy. Regardless of company size or industry, you need a cybersecurity policy to ensure cybersecurity best practices in your organization. A cybersecurity policy contains preventive measures that protect your network from cybercriminals. To ensure that your cybersecurity policy is easy to read, understand, and implement, you need cybersecurity policy document proofreading and editing services. Your cybersecurity policy spells out cybersecurity dos and don’ts drafted from industry and state regulations that your employees should follow. It states the instructions your employees should follow to prevent cyberattacks and how they should react when they notice a network security breach. This protects data, promotes customer privacy, and prevents cyber-attacks. In this article, we spell out why you need cybersecurity proofreading and editing services.

Read More

Guide to Cloud Security Certification: Which Ones Are the Best of the Best?

Article | April 27, 2021

As your organization looks to move to cloud computing, security certification will become more critical. Cloud solutions have unique security considerations that are different from an on-premise solution. IT professionals that are managing these solutions should be well-versed in multi-layered protection, encryption, monitoring, and more. Not only is certification important for your own IT staff, but it should also be part of your recruiting strategy. Experience combined with certifications can be invaluable foclr protecting your cloud environment. You want to ensure that the data you store in the cloud is protected from security threats.

Read More

EMAIL SECURITY CONCEPTS THAT NEED TO BE IN YOUR EMAIL INFOSEC POLICY

Article | June 16, 2021

Compliance requirements have become more complex because of the continual evolution of security threats and vulnerabilities. Many organizations fail to create an extensive security program to cover their challenges. Emails are one of the most susceptible channels for cyber-criminals to operate. This is why every organization must pay keen attention to email security policies in cybersecurity. Because emails are prone to cyberattacks, enterprises and individuals must take critical measures to secure their email accounts against unauthorized access. Malicious actors use phishing to trick recipients into sharing sensitive information, either by impersonating trusted contacts or legitimate business owners. Email is still one of the most vulnerable avenues for hackers and cyber crooks. Here are the critical email security concepts that need inclusion into your information security policy.

Read More

Security by Sector: Improving Quality of Data and Decision-Making a Priority for Credit Industry

Article | February 17, 2020

The subject of how information security impacts different industry sectors is an intriguing one. For example, how does the finance industry fare in terms of information security compared to the health sector, or the entertainment business? Are there some sectors that face greater cyber-threats and risks than others? Do some do a better job of keeping data secure, and if so, how and why?A new study of credit management professionals has revealed that improving the quality of data and decision-making will be a top priority for the credit industry in the next three years. The research, from Equifax Ingnite in collaboration with Coleman Parkes, takes a deep dive into the views of credit management pros across retail, banking, finance and debt management/recovery sectors.

Read More

Spotlight

xandora.net

Xandora.net is a tool for analyzing the behavior of Windows PE-executables with a special focus on the analysis of malware. Xandora provides a detailed report that contains enough information to give a security analyst or researcher what they need to know about the purpose and the actions of the analyzed binary. The generated report includes detailed data about modifications made to the Windows registry or the file system or other processes and of course it logs all generated network traffic. The analysis is based on running the binary in an emulated environment and watching. Xandora scores each analyzed file with an X-Score that indicates the degree of maliciousness. The results from Virustotal are also provided in the report to quickly identify if the file is known and AV signatures already available.

Events