Dams Sector Cybersecurity Program Guidance

May 1, 2019

This document was developed with input, advice, and assistance from the Dams Sector Cybersecurity Working Group and council members of the Dams Government Coordinating Council (GCC) and Sector Coordinating Council (SCC), which included representatives from the public and private sector. The Dams Sector Cybersecurity Program Guidance consolidates effective industry practices into a framework for owners and operators to develop and/or improve a cybersecurity program. The document is primarily intended as a resource to small and medium-sized owners and operators with varying levels of cybersecurity knowledge. However, the information may be useful to all Dams Sector owners and operators, regardless of size.

Spotlight

Bask Technology, Inc.

To help us grow and improve our services, our company has just completed a careful rebranding process. We are pleased to announce that iTOK is now officially Bask. While our name and logo has changed, our core vision, pricing, and services have not. To learn more, visit our new website at www.bask.com Founded in 2004, Bask is a leader in technology support, servicing consumers and small businesses worldwide. Bask's mix of remote technology support together with proactive maintenance and award-winning software is why it was recognized as the 24th fastest growing company in the region by the Mountain West Capital Network.

OTHER WHITEPAPERS
news image

Protecting Against Sophisticated Bot Attacks

whitePaper | November 18, 2022

Bot-generated attacks have risen in visibility, and defending against these attacks is now a priority for most organizations. Yet challenges persist in accurately identifying bot traffic; protecting a distributed, heterogeneous application environment from these attacks; and minimizing the impact to legitimate users while doing so. To address these issues, intelligent protection against sophisticated bots is a necessity. This should include strong analytics coupled with human expertise, a frictionless user experience, and consistent coverage across different architectures and platforms. F5 Distributed Cloud Bot Defense, built on Google Cloud, supports these requirements and can help prevent fraud and abuse against public-facing web applications.

Read More
news image

Cyber Security After the Pandemic

whitePaper | April 29, 2021

The cyber security industry has faced two major sets of challenges over the last twelve months. The attacks and exploits affecting Solar Winds, Accellion, Microsoft and their customers have focused attention on supply chain risk, but the impact of the coronavirus pandemic has been felt more broadly across cyber security domains and disciplines.

Read More
news image

Managing the IT Modernization Elephant A bite-sized approach to digital modernization

whitePaper | June 15, 2022

There’s an old saying, “How do you eat an elephant? One bite at a time.” In some cases, the task of technology modernization is akin to eating an elephant. Government agencies are filled with legacy applications, many of which have been heavily customized over decades of operation.

Read More
news image

AWS Best Practices for DDoS Resiliency

whitePaper | December 5, 2019

You work to protect your business from the impact of Distributed Denial of Service (DDoS) attacks, as well as other cyberattacks. You want to keep your customers’ trust in your service by maintaining the availability and responsiveness of your application. And you want to avoid unnecessary direct costs when your infrastructure must scale in response to an attack.

Read More
news image

API Security: Best Practices for Vulnerability Mitigation

whitePaper | June 6, 2023

API Security: Best Practices for Vulnerability Mitigation provides a hands-on approach to mitigate security vulnerabilities in APIs. The paper emphasizes the importance of implementing security measures that protect the API and underlying infrastructure. The paper identifies various security vulnerabilities that can arise in APIs and provides detailed guidelines for securing them. These guidelines cover authentication, authorization, input validation, output encoding, error handling, logging, and auditing.

Read More
news image

State Of Zero Trust in The Enterprise:Shift To Identity-Powered Security

whitePaper | October 27, 2022

Cybersecurity has changed. The attack surface has expanded, thanks to the rapid adoption of cloud applications and services, shift to remote work, and proliferation of mobile devices. Having enterprise systems, applications, and data in one location and relying on layers of security tools and controls to keep attackers out, is no longer sufficient when the bulk of data and workloads now live outside the traditional network. Attackers are also increasingly targeting credentials to appear as legitimate users.

Read More

Spotlight

Bask Technology, Inc.

To help us grow and improve our services, our company has just completed a careful rebranding process. We are pleased to announce that iTOK is now officially Bask. While our name and logo has changed, our core vision, pricing, and services have not. To learn more, visit our new website at www.bask.com Founded in 2004, Bask is a leader in technology support, servicing consumers and small businesses worldwide. Bask's mix of remote technology support together with proactive maintenance and award-winning software is why it was recognized as the 24th fastest growing company in the region by the Mountain West Capital Network.

Events