recommendations

What is Lurking on Your Network

Exposing the threat of shadow devices Most internet communications rely on DNS, although it is often not sufficiently secured, which creates vulnerabilities that can be exploited for data exfiltration and spreading malware. Over 91 percent of malware uses DNS to communicate with C&C servers, lock up data for ransom or exfiltrate data. Existing security controls, […]

What is Lurking on Your Network Read More »

An industry-driven view of identity and access management

Identity and access management (IAM) solutions enable organizations to seamlessly and securely connect employees to the work required for their role. IAM technologies work throughout the lifecycle of an employee – from onboarding, to delegating levels of access, managing user authentication during the workday, to offboarding when an employee leaves the organization. However, every business

An industry-driven view of identity and access management Read More »

Foundational Cybersecurity Activities for IoT Device Manufacturers

The purpose of this publication is to give manufacturers recommendations for improving how securable the Internet of Things (IoT) devices they make are. This means the IoT devices offer device cybersecurity capabilities—cybersecurity features or functions the devices provide through their own technical means (i.e., device hardware and software)—that device customers, including both organizations and individuals,

Foundational Cybersecurity Activities for IoT Device Manufacturers Read More »