Back to Search Begin New Search Save Search Auto-Notify
The Power of Voice to Prevent Fraud
Nuance security and biometrics solutions enable easy and secure authentication by identifying a person based on their human traits; like their voice, fingerprints, face or even how they use their devices. The importance of security cannot be understated. Today's businesses rely on working with known customers in a friction-free environment. To get to that level of customer service, organizations need to be confident that their customer is who...
Add Favorite
Collaboration and Zero Trust in a Volat...
Now more than ever, there’s a need for a flexible, future-state identity service that enables a fast and secure shift to support a remote and collaborative workforce outside the network. Federal employees need to work with contractors from home. Citizens need to engage via digital means rather than in person. Constituents not only require access to mission-critical tools they were already using but the pandemic has highlighted the need t...
Add Favorite
Mitigating Business Email Compromise an...
Email fraud leads to two main threats - one is Business Email Compromise (BEC) where attackers pretend to be you; the other one is Email Account Compromise (EAC) where attackers become you. BEC/EAC scams have cost the victimized organizations over $26 billion since 2016. What they have in common is that they both target people.They both rely on social engineering and are designed to solicit fraudulent wire transfers or payment. Unlike malware...
Add Favorite
What Is Cybersecurity Engineering and W...
When systems were predominately hardware-based, components were built to specification. Systems engineers defined and verified component functions and interfaces that together provided total system capability. Today, system capability is largely supplied through software components and network connectivity. This increases the system’s flexibility and adaptability—and its cyber risk! Software components are specified loosely, if at...
Add Favorite
How to Catch Advanced Persistent Threat...
Join Dr. Richard T. White and Robert D. Long of Tennessee Department of Transportation's Cyber Security Team on how they secure of the Top 5 highway systems in the U.S. against advanced persistent threats (APTs) and ransomware attacks. Richard and Robert will be interviewed by Val Bercovici, CEO and co-founder of Chainkit about the their new architecture and highlights published in their new technical paper: Secure Connectivity for Intelligent...
Add Favorite
Cloud Security Alliance| CCSK Foundation v4.1
The Certificate of Cloud Security Knowledge OnDemand Training program promotes the use of best practices for providing security assurance within Cloud Computing. Intrinsec’s OnDemand CCSK Foundation resources will help you successfully prepare for the Certificate of Cloud Security Knowledge (CCSK) exam. Official CCSK Foundation Student Handbook Over 10 Hours of CCSK Video Content Accessible via your provided student account, you can conv...
Add Favorite
Human Reporting + AI to Protect Your Ag...
Use Human Reporting + AI to Protect Your Agency from a Breach You don’t have to look far to find a headline about a recent breach or compromise within the public sector, and as reported in the 2021 Verizon Data Breach Investigations Report, not only is the public sector the second most victimized industry when it comes to cyberattacks, but phishing was behind 70% of government breaches. As threat actors continue to innovate their approac...
Add Favorite
Dynamic Capital Planning: Streamline Go...
From pre-project planning to closeout, it is important to unite your team to maintain effective collaboration and project visibility. Siloed teams often require the use of multiple different strategies, processes, and resources, which can prevent accurate transparency and project stage reporting. To eliminate these difficult silos, streamline your agencies’ facilities management and construction project lifecycle with Smartsheet Gov and...
Add Favorite
Top 10 Questions on the Single Audit an...
While the American Rescue Plan Act (ARPA) has been passed into law and relief is already being distributed to states, counties, cities, tribes, and territories, there are still many lingering questions. One of the top questions coming up - "Will my entity be subject to a single audit?" Most likely the answer is “yes". The last thing you want your government organization to experience is audit findings and the risk of owing money to the...
Add Favorite
Unifying Cyber Defense Teams with Share...
The ThreatQ platform is designed to improve security operations workflows by delivering immediate and significant value across multiple use cases to include data management, prioritization, integrations, collaboration, and curated threat data sharing. ThreatQ provides the ability to securely share curated threat data between organizations automatically. Whether to block an IP, detonate a malicious file, or alert an organization to a possible n...
Add Favorite
Back to Search Begin New Search