Zero Trust Cybersecurity Current Trends

April 18, 2019

The American Council for Technology (ACT) is a non-profit educational organization established to create a more effective and innovative government. ACT-IAC provides a unique, objective, and trusted forum where government and industry executives are working together to improve public services and agency operations through the use of technology. ACT-IAC contributes to better communication between government and industry, collaborative and innovative problem solving, and a more professional and qualified workforce.

Spotlight

Reflexion Networks, Inc.

Reflexion Networks provides hosted services for email and Web security, email archiving and discovery, and business continuity. In addition to providing an effective defense against email and Web-borne malware, Reflexion’s “in-the-cloud” services help companies save money and staff time, reduce bandwidth and energy consumption, and ensure email availability even in the event of a local server or business outage. Reflexion’s solutions are sold exclusively through a worldwide network of IT solution providers.

OTHER WHITEPAPERS
news image

Proven Ways to Prevent Ransomware Attacks

whitePaper | September 22, 2022

Ransomware is one of the fastest-growing and most costly cyber threats. According to a recent Perimeter 81 survey of over 500 IT professionals, 76% of respondents reported that their company experienced an attack within their organization.

Read More
news image

The Ransomware Threat

whitePaper | December 22, 2022

Ransomware continues to be among the most critical risks facing organizations of all sizes. Attackers have perfected techniques and business models that will pose a challenge to even the best prepared organizations. While the encryption of a high volume of computers on a network can potentially be mitigated by adequate backups, ransomware actors have discovered new avenues of extortion, such as threatening to release data stolen prior to encryption. While ransomware attacks are time consuming to perform, ransomware actors have managed to achieve scale through the introduction of “ransomware-as-a-service” operations, renting out their tools and infrastructure to other attackers in exchange for a cut of the profits.

Read More
news image

CISA Stakeholder-Specific Vulnerability Categorization Guide

whitePaper | November 9, 2022

The CISA Stakeholder-Specific Vulnerability Categorization (SSVC) is a customized decision tree model that assists in prioritizing vulnerability response for the United States government (USG), state, local, tribal, and territorial (SLTT) governments; and critical infrastructure (CI) entities. This document serves as a guide for evaluating vulnerabilities using the CISA SSVC decision tree. The goal of SSVC is to assist in prioritizing the remediation of a vulnerability basedon the impact exploitation would have to the particular organization(s).

Read More
news image

2020 Cyber Security Predictions

whitePaper | January 28, 2020

This year there are some common themes that endure, so we’ll highlight these as “work in progress”. Transformations often take longer than 12 months to be identifi ed as necessary, to be executed and to become established. However, there are other themes emerging through a combination of drivers from audit, compliance security and governance that are now showing signs of infl uencing the way that cyber risks are managed in a much shorter timescale.

Read More
news image

Scenarios for the Future of Cybercrime - White Paper for Decision Makers

whitePaper | January 28, 2020

Project 2020 is an initiative of the International Cyber Security Protection Alliance (ICSPA). Its aim is to anticipate the future of cybercrime, enabling governments, businesses and citizens to prepare themselves for the challenges and opportunities of the coming decade. It comprises a range of activities, including common threat reporting, scenario exercises, policy guidance and capacity building.

Read More
news image

2022 Cybersecurity Predictions

whitePaper | June 27, 2022

At the end of every year, our experts put their heads together to anticipate and prepare for what’s to come next in the world of cybersecurity. We retrospect on the months past, and analyze impactful developments, breaches, and tactics. We package the outputs of this process for IT leaders, so they, too, can anticipate and prepare.

Read More

Spotlight

Reflexion Networks, Inc.

Reflexion Networks provides hosted services for email and Web security, email archiving and discovery, and business continuity. In addition to providing an effective defense against email and Web-borne malware, Reflexion’s “in-the-cloud” services help companies save money and staff time, reduce bandwidth and energy consumption, and ensure email availability even in the event of a local server or business outage. Reflexion’s solutions are sold exclusively through a worldwide network of IT solution providers.

Events