Emerging Technology, Cybersecurity

SECURING THE SOFTWARE SUPPLY CHAIN

August 15, 2022

Secuing the whitepaper
Cyberattacks are conducted via cyberspace and target an enterprise’s use of cyberspace for the purpose of disrupting, disabling, destroying, or maliciously controlling a computing environment or infrastructure; or destroying the integrity of the data or stealing controlled information.1 Recent cyberattacks such as those executed against SolarWinds and its customers, and exploits that take advantage of vulnerabilities such as Log4j, highlight weaknesses within software supply chains, an issue which spans both commercial and open source software and impacts both private and Government enterprises. Accordingly, there is an increased need for software supply chain security awareness and cognizance regarding the potential for software supply chains to be weaponized by nation state adversaries using similar tactics, techniques, and procedures (TTPs).

Spotlight

BBSRC

The Biotechnology and Biological Sciences Research Council (BBSRC) is part of UK Research and Innovation, a non-departmental public body funded by a grant-in-aid from the UK government.

OTHER WHITEPAPERS
news image

How System Integrators address evolving Government ICT

whitePaper | December 1, 2022

The business of providing information and communications technology (ICT) integrations to governments has changed significantly over the past five years. Before the disruptions caused by the pandemic, government ICT requirements were well-understood. Most government departments were in the process of either starting or planning for a cloud-centric digital transformation that would enable more efficient operations and a more effective delivery of services to citizens. However, the onset of the pandemic derailed most of those plans when the key priority shifted to finding ways for government employees to continue to do their jobs remotely

Read More
news image

Customer Chronicles — Securing State and Local Government Agencies with Strong MFA

whitePaper | February 3, 2020

Protecting sensitive data and maintaining cybersecurity hygiene are top concerns for security professionals and CISOs from state and local government agencies. Government networks contain sensitive data such as social security numbers, voter registration, medical records, bank account and credit card numbers of millions of people and businesses, which can make them an attractive target for bad actors. With the increasing sophistication of cyberattacks and the lack of resources at their disposal, the IT departments across these agencies are looking for a solution that enables them to do more with less. We built Duo to be a simple, affordable and secure solution to help government agencies – and organizations of all sizes – solve to these problems.

Read More
news image

UNITED STATES GOVERNMENT WOMEN, PEACE, AND SECURITY CONGRESSIONAL REPORT

whitePaper | July 18, 2022

The world is more peaceful, safe, and prosperous when the human rights of women are respected and they can fully participate in economic, social, and political life. But we know the enduring challenges of fulfilling that promise. A defining competition between democracies and autocracies. The COVID-19 pandemic. The climate crisis. Mass migration and displacement. The denial of education and sexual violence against women and girls across the world. No matter what global crisis unfolds—women and girls are disproportionately impacted, and that makes the world less stable.

Read More
news image

National Cyber-Informed Engineering Strategy

whitePaper | June 15, 2022

In today’s increasingly interconnected world, America’s safety and well-being depend on cybersecurity. That’s why President Biden considers hardening the nation against cyberattacks a top priority for his administration—and one that has only grown in importance as the country embarks on the biggest buildout of critical infrastructure and manufacturing capacity in a generation. Each stage of the clean energy transformation that will bringwith it an opportunity and an imperative to further increase security, reliability, and resilience in American’s energy sector. The Cyber-Informed Engineering (CIE) Strategy shows us how we can seize the opportunity to address these challenges.

Read More
news image

Digital Trust

whitePaper | November 1, 2022

Digitalisation offers new approaches to trust. Competitors who do not see eye-to-eye can still transact efficiently because technologies such as privacy-enhancing technologies, distributed ledgers (also called shared ledgers), coupled with good governance in processes now enable these interactions even without parties knowing who they transact with.

Read More
news image

Beyond the VPN: Zero Trust Access for a Federal Hybrid Work Environment

whitePaper | February 27, 2023

The virtual private network (VPN) has been a powerful tool in the network security administrator’s toolbox for decades, because it has provided a means for remote computers to communicate securely across an untrusted network such as the internet. Whether for branch offices communicating with headquarters (siteto-site), or an employee working from home (remote access), the VPN provided a secure point-to-point tunnel back to resources on protected networks.

Read More

Spotlight

BBSRC

The Biotechnology and Biological Sciences Research Council (BBSRC) is part of UK Research and Innovation, a non-departmental public body funded by a grant-in-aid from the UK government.

Events