How to button up a cybersecurity risk on every computer in the government
Often attachments with malicious payloads come in the popular Adobe PDF format. Recently, the National Security Agency issued guidance for how to configure…
Often attachments with malicious payloads come in the popular Adobe PDF format. Recently, the National Security Agency issued guidance for how to configure…
The Domain-Based Message Authentication, Reporting and Conformance standard (DMARC) is designed to lower the risk of phishing attacks.
Bill Evanina, the director of the National Counterintelligence and Security Center and the National Counterintelligence Executive, said foreign hackers…
A phenomenon called the “cyber caliphate” is producing ever-rising levels of cyber-attacks and real-world violence. ICIT’s James Scott has advice for how agencies can defend against and attack cyber-jihadists.