Making IT happen

Partner Post: Minitab's Blog Compare 2 Drone Pilots: Flying High with Analytics

In recent years, an increasing number of government and law enforcement agencies use drones to get a bird’s eye view from the sky. To be effective, drones must be able to maneuver quickly to their intended target. Swift maneuvers enable them to navigate complex environments and accomplish their tasks efficiently. The requirements to become a certified drone pilot vary by country, but all require that you pass a written exam on aeronautical knowledge administered by the aviation authority. Surprisingly, (at the time of this post) there is no requirement to demonstrate performance. So how can we compare the flight skills of two certified drone pilots?

Partner Post: NETSCOUT's Blog Is Overreliance on Perimeter-Based Security Undermining Your Security Efforts?

Here’s how to fortify your security posture. In today’s world, we regularly encounter headlines about major security breaches across various industries, spanning government agencies, consumer goods, finance, gaming, and more. It’s evident that no industry is immune to these threats. However, what often goes unnoticed is that the most significant damage occurs once malicious actors gain initial access to a network.

Partner Post: Xage Security's Blog on the National Renewable Energy Laboratory Releases First Clean Energy Cybersecurity Accelerator Report

The U.S. Department of Energy’s National Renewable Energy Laboratory (NREL) has released a public report outlining the procedures and outcomes of the first cohort of the NREL-led Clean Energy Cybersecurity Accelerator (CECA) program. Xage Security was one of three cybersecurity solution providers to participate in the first CECA cohort.

Partner Post: Anthology's Blog on Empowering Government Agencies with Anthology's Innovative Approach to Course Design and Accessibility

Author: Celena Westlund, Senior Marketing Manager for Business and Government Anthology In the fast-paced world of training and development, agility and adaptability are paramount. With a staggering 73% of learning and development teams in the U.S. consisting of 10 or fewer members, and over twenty million civilian federal, state, and local government employees, the challenges of building effective training courses for mission success are abundantly clear. Anthology, formerly known as Blackboard, understands the complexities involved in this endeavor and has risen to the occasion by creating tools that are not only responsive but also transformative.

Partner Post: ZeroFox's Blog on Understanding External Cybersecurity in the US Public Sector: Shifting Mindsets, Teams, and Tools to Address Today’s Threats Outside the Perimeter

By Keren Cummins Federal intelligence teams have been monitoring “external cybersecurity” for decades. Whether attempting to find chatter about vulnerabilities on the dark web or uncovering plans to attack an agency network, the external attack surface is a well understood battleground with well understood threat actors. So, what has changed in “external cybersecurity” in the context of today’s threat environment, and why should every government agency be prioritizing it as part of their security strategy? At ZeroFox we like to think of “external cybersecurity” as referring to a new attack surface formed by “gray space.” As opposed to red space (adversary infrastructure) or blue space (organizational infrastructure), gray space is the internet infrastructure, applications, platforms, and forums that are typically managed by third parties.


Subscribe to our newsletter for the latest industry news, events and promotions