Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Fed Gov Today: Breaking Security Barriers to Government Modernization

Jim Coyle, U.S. Public Sector CTO at Lookout, discusses the challenges government agencies face in embracing mobility, cloud security, and AI. While modernization efforts are progressing, many organizations still struggle with security concerns, particularly around mobile devices, which are increasingly targeted by cyber threats. Coyle highlights the need for stronger public-private partnerships to accelerate secure digital transformation. He also shares the importance of understanding data sovereignty in AI and improving endpoint security to protect classified and unclassified information.

Massive DDoS on X: Dark Storm or Cyber Fog?

Earlier this week, users of the X (formerly Twitter) social network were either unable to access the platform or experienced service degradation somehow. On March 10, 2025, reports emerged of users worldwide being unable to log in, post, or view content. This incident was later attributed to a large-scale distributed denial-of-service (DDoS) attack targeting X's infrastructure.

The Purdue Enterprise Reference Architecture: Strengthening IoT and OT Security in Industrial Environments

In an era where Industrial Internet of Things (IIoT) and Operational Technology (OT) are converging, securing industrial environments has never been more critical. The Purdue Enterprise Reference Architecture (PERA), a model that has been a foundation for network segmentation and security for over three decades, remains a pivotal framework for safeguarding industrial systems in this complex digital age.

NIST SP 800-171 Rev 2 vs Rev 3: What's The Difference?

Government cybersecurity and information security frameworks are a constant work in progress. Many different frameworks draw their requirements from the National Institute of Standards and Technology, and one of the most important documents for cybersecurity is NIST Special Publication 800-171: Protecting Controlled Unclassified Information in Nonfederal Systems and Organizations.

Security Week teaser and Lisbon's waves of entropy

We’re back with new episodes in 2025, kicking off this week with a Security Week teaser. Host João Tomé is joined by Michael Tremante, Sr. Director of Product Management, to discuss what to expect from our first innovation week of the year, starting next week. They also explore the security landscape in 2025 and the importance of simplicity.

Eliminate Security Complexity on Pi Day | WatchGuard Technologies

Cyber threats don’t stop, just like Pi (π). That doesn’t mean your security should be stuck in an endless loop of updates, patching, and stress. WatchGuard delivers real security - tailored to you, eliminating complexity, and keeping you ahead of threats. This Pi Day (3.14), let’s celebrate security that works.

Beyond Checkboxes: The Essential Need for Robust API Compliance

APIs serve as essential links in today’s digital infrastructure, enabling data sharing and application integration. However, their widespread use has made them prime targets for attackers. Hence, strict compliance with security regulations is not just optional; it is imperative for business success. The increasing frequency of data breaches and the sophistication of cyber threats highlight the pressing need for strong API security.