Behavior-based detection and dynamic threat intelligence are essential to enhancing security operations and reducing cyber threat response times, says ThreatLocker CEO Danny Jenkins.
It’s crucial to review and restrict application access to sensitive data. ThreatLocker CEO Danny Jenkins outlines a three-step process for handling these permissions to better secure systems.
Shelly Hartsook, acting associate director of CISA’s Cybersecurity Division, speaks during CyberTalks in Washington, D.C., on Oct. 30, 2024. (Scoop News Group photo)
Shelly Hartsook said she’s seen promising data on implementation of security protocols ahead of next week’s due date for agencies to submit updated plans.
GuidePoint Security’s Federal CTO says taking a zero-trust approach will be critical to breaking down silos and complexities and moving into a stronger cybersecurity posture.