How important is cybersecurity in policy, and why? How does the SolarWinds hack play into overall cybersecurity? R Street Institute’s Resident Fellow Kathryn Waldron and Resident Senior Fellow Paul Rosenzweig answer these questions through immersive…
The Great Courses, The Teaching Company A police officer places a GPS device on a suspected drug dealer’s car to trace his whereabouts and build a case against him. A popular retail store uses predictive analytics to send pregnancy-related advertising to a teenager...
Enterprises can manage, mitigate and monitor their cyber risks by mapping threats and adversary tactics, techniques and procedures to known vulnerabilities. Ultimately, the goal is to have a scalable, reproducible metric for risk. On Feb. 4, 2021,…
Seems like an easy question. Less costly and more efficient beats expensive and inefficient every day, and twice on Sundays. Arizona had one of the most successful elections of the 2020 cycle. In the face of a global pandemic and record-breaking…
Securing federal systems, revisiting Solarium recommendations among first priorities, policy pros say With the SolarWinds and Microsoft Exchange hacks framing every discussion around federal cybersecurity efforts, policy pros are offering a variety…
Adopt threat modeling, control validation, and ATT&CK. Technology providers should anticipate being targeted by threat actors—either for financial gain or as a stepping stone into customer environments—and apply and validate security controls based…