Managing the Cyber-Nuclear Nexus

July 24, 2019

Concern about cyber increasingly impacts all aspects of nuclear security, nuclear operations and nuclear thinking. The wide range of dynamics that fall under the cyber moniker are both changing and transforming the nature, capabilities and vulnerabilities of nuclear weapons, as well as the broader context within which security policy and warfare are conducted. This in turn has meant that states are wrestling with new issues of deterrence, arms control and stability as well as the safety, security and management of nuclear weapons and the future shape of the global nuclear order.

Spotlight

ThirdPartyTrust

ThirdPartyTrust’s SaaS vendor risk management platform simplifies assessments of third and fourth party vendors. By analyzing vendor cyber risk using a network-based solution, trust is built and mapped within the vendor eco-system. Enterprises simply invite their vendors (e.g. IT service providers, consultants and contractors) to create a ThirdPartyTrust profile, which can include security audits, insurance certificates and compliance documentation. Enterprises then perform their assessments using the collaborative platform simplifying the process through automation and real-time tools.

OTHER WHITEPAPERS
news image

The Importance of Cybersecurity Threat Detection for Utilities

whitePaper | November 25, 2019

Cybersecurity threats against energy companies, including utilities, have been increasing at an alarming rate. A comprehensive approach to ensuring cyber protection is essential and should include cybersecurity threat detection as a standard element. But not all such cybersecurity solutions are created equal.

Read More
news image

Cloud-native security practicesin IBM Cloud

whitePaper | December 15, 2019

IBM Cloud™ is IBM’s high-performing public cloud platform, with data centers around the world that deliver cloud computing options from infrastructure as a service (IaaS), platform as a service (PaaS) to software as a service (SaaS). Security is a fundamental design principle for our cloud platform with market-leading security capabilities enabled for regulatory workloads.

Read More
news image

Harness Advanced Push-to-talk to Transform Physical Security Operations

whitePaper | December 21, 2022

Hytera’s mission is to develop the future-proof solutions with a holistic approach to your critical communications system and service needs, support public safety agencies in making the city safer, and enable security organisations to keep the enterprise more secure and ensure the safety and security of responders and staff, through driving more efficiency, effectiveness and productivity to operation and management of both daily operations and critical emergencies, while reducing the cost.

Read More
news image

Adobe Acrobat with Document Cloud Services Security Overview

whitePaper | October 26, 2022

At Adobe®, we know the security of your digital experiences is important. Security practices are deeply ingrained into our internal software development and operations processes and tools and are rigorously followed by our cross-functional teams to prevent, detect, and respond to incidents in an expedient manner.

Read More
news image

Managed Security Services Platform for SOC

whitePaper | November 23, 2022

Managed Security Services (MSS) uses a combination of People, Process and Technology to deliver Intelligent SOC Capabilities. CyberRes MSS platform collects and correlates data from multiple enterprise log sources & specialized security toolsets along with integrated with custom Threat Intelligence, SOC Portal to provide comprehensive Threat Detection & Response capabilities plus better overall security outcomes.

Read More
news image

Aerospace cybersecuirty- Bringing a zero-trust approach to aviation product network design

whitePaper | May 18, 2022

Modern aerospace products are moving into containerization and micro-services. Mounting connected internal micro-services patterns in a product segregates and segments the network to support a zero-trust network security approach. Having weak internal network security of the product allows malicious actors to exploit them and elevate privileges — denying users access, jamming signals, or even shutting them down. Such interference could cause major harm to aircraft safety and operations.

Read More

Spotlight

ThirdPartyTrust

ThirdPartyTrust’s SaaS vendor risk management platform simplifies assessments of third and fourth party vendors. By analyzing vendor cyber risk using a network-based solution, trust is built and mapped within the vendor eco-system. Enterprises simply invite their vendors (e.g. IT service providers, consultants and contractors) to create a ThirdPartyTrust profile, which can include security audits, insurance certificates and compliance documentation. Enterprises then perform their assessments using the collaborative platform simplifying the process through automation and real-time tools.

Events