News


Making IT happen

Partner Post: NETSCOUT's Blog Is Overreliance on Perimeter-Based Security Undermining Your Security Efforts?

Here’s how to fortify your security posture. In today’s world, we regularly encounter headlines about major security breaches across various industries, spanning government agencies, consumer goods, finance, gaming, and more. It’s evident that no industry is immune to these threats. However, what often goes unnoticed is that the most significant damage occurs once malicious actors gain initial access to a network.

Partner Post: Xage Security's Blog on the National Renewable Energy Laboratory Releases First Clean Energy Cybersecurity Accelerator Report

The U.S. Department of Energy’s National Renewable Energy Laboratory (NREL) has released a public report outlining the procedures and outcomes of the first cohort of the NREL-led Clean Energy Cybersecurity Accelerator (CECA) program. Xage Security was one of three cybersecurity solution providers to participate in the first CECA cohort.

Partner Post: Anthology's Blog on Empowering Government Agencies with Anthology's Innovative Approach to Course Design and Accessibility

Author: Celena Westlund, Senior Marketing Manager for Business and Government Anthology In the fast-paced world of training and development, agility and adaptability are paramount. With a staggering 73% of learning and development teams in the U.S. consisting of 10 or fewer members, and over twenty million civilian federal, state, and local government employees, the challenges of building effective training courses for mission success are abundantly clear. Anthology, formerly known as Blackboard, understands the complexities involved in this endeavor and has risen to the occasion by creating tools that are not only responsive but also transformative.

Partner Post: ZeroFox's Blog on Understanding External Cybersecurity in the US Public Sector: Shifting Mindsets, Teams, and Tools to Address Today’s Threats Outside the Perimeter

By Keren Cummins Federal intelligence teams have been monitoring “external cybersecurity” for decades. Whether attempting to find chatter about vulnerabilities on the dark web or uncovering plans to attack an agency network, the external attack surface is a well understood battleground with well understood threat actors. So, what has changed in “external cybersecurity” in the context of today’s threat environment, and why should every government agency be prioritizing it as part of their security strategy? At ZeroFox we like to think of “external cybersecurity” as referring to a new attack surface formed by “gray space.” As opposed to red space (adversary infrastructure) or blue space (organizational infrastructure), gray space is the internet infrastructure, applications, platforms, and forums that are typically managed by third parties.

Partner Post: Anthology's Blog on the Importance of Empowering Instructors for Responsible AI Adoption

By Jim Chalex and Nicolaas Matthijs With the recent widespread availability of generative AI technology, many institutional leaders are faced with a fundamental strategic question: how can the efficiencies of AI be leveraged without jeopardizing academic integrity? We are actively discussing this challenge with clients worldwide and have released our Trustworthy AI Approach to provide full transparency on Anthology’s approach to AI, including how it informs product development. A central pillar of this is what we call “humans in control”, meaning our global education community can choose whether to adopt AI-powered capabilities within our solutions—and the timeline for adoption—based on their institution’s policies and preferences.

Subscribe

Subscribe to our newsletter for the latest industry news, events and promotions