Public Sector

Why Are So Many Public Sector Organizations Getting Attacked?
Public sector organizations such as schools, hospitals, manufacturing units, essential services and government offices have become a popular target for cybercriminals ...
Security Boulevard
“Mission Possible”: How DTEX is Supporting National Security from the Inside Out
When considering the most significant cyber threats to the public sector, many immediately think of foreign adversaries breaching federal agencies. This perception is understandable, as nation-state cyber attacks often dominate headlines. However, ...
The CJIS Compliance Deadline is Fast Approaching | Is your state / local government ready?
The deadline for CJIS compliance is rapidly approaching – it is mandated that all entities accessing criminal justice information (CJI) must have an acceptable multi-factor authentication (MFA) solution in place by October ...
Zero Trust Meets Insider Risk Management
Kellie Roessler | | DoD, Dtex Systems, EO, Federal, insider risk, Insider Risk Management, Public Sector, trusted workforce, visibility, zero trust
What do Jack Teixeira, Joshua Schulte, and Korbein Schultz have in common? All three worked for the federal government in some capacity, and all three used their insider access for nefarious purposes, ...
Insights from CISA HPH Sector Risk and Vulnerability Assessment
Rohan Timalsina | | cisa, CISA Advisories, CISA Advisory, CISA Threat Update, Cyber Attack Risk Assessment, Cyber Threats, Cybersecurity, cybersecurity defense strategies, Cybersecurity Weaknesses, healthcare, healthcare cybersecurity, healthcare organizations, Linux & Open Source News, Public Sector, vulnerability assessment
In an ever-evolving digital landscape, the healthcare and public health (HPH) sector faces increasing cybersecurity challenges. The United States Cybersecurity and Infrastructure Security Agency (CISA) recently conducted a Risk and Vulnerability Assessment ...

STIGs, FIPS, ZT, and API Security
Leading by Example The United States has been a leader in information technology for decades, and the U.S. government has been a major driver in that arena from the start. Considering the ...

DoD Identifies API Security as Critical for Zero Trust
The opening line of the newly published Department of Defense (DoD) Zero Trust Strategy should be a warning to all: “Our adversaries are in our networks, exfiltrating our data, and exploiting the ...

Forrester Identifies API Security as an Important Technology Category in a Zero Trust Architecture
The global research firm, Forrester, recently published its latest Forrester Tech Tide™(1) focused on twenty technologies that underpin Zero Trust threat prevention. By analyzing business value and maturity of each technology , ...

Stolen Future: How Data Theft Dilutes Our Growth Trajectory
During my 34-year career in federal law enforcement, I repeatedly saw the damage data theft caused to unsuspecting victims. Whether the result was an elderly retiree losing their life savings, a company ...

How API Security Can Help You Prepare For FedRAMP
Cloud companies that wish to do business with the United States federal government can only do so if they receive authorization under the Federal Risk and Authorization Management Program (FedRAMP). For a ...