Detect and Secure IoT and Rogue Devices, While Satisfying NIST RMF Security Requirements

We all know that the Internet of Things (IoT) is here. But IT professionals responsible for enterprise communications networks aren’t exactly sure where IoT resides on their networks or whether these devices are secured. Rogue devices are everywhere (although not all are out to steal the blueprints to the Death Star) but according to a survey sponsored by ForeScout Technologies, only 30% are confident that they know what IoT devices are on their network.

DHS Designates New Protections for U.S. Election Infrastructure

On the same day that U.S. intelligence agencies issued a non-classified report citing that Russian state-sponsored influence campaigns sought to “undermine public faith in the U.S. democratic process…” using a blend of covert activity (such as cyber activity) with overt efforts (state-funded media, paid trolls, etc.) the Department of Homeland Security took steps to protect the bedrock of our voting system – the nation’s election infrastructure.

OPM Chastised for Lack of Security Analytics: “Breach Easily Preventable”

The OPM breach of 2014/2015, the largest government cybersecurity breach in history, was easily preventable. That’s according to a report released by The House Committee on Oversight and Government Reform published on September 7th, 2016.

The report, titled: “How the Government Jeopardized Our National Security for More than a Generation” urges federal CIOs to act: