Endpoint security management
A policy-based approach to network security in which endpoint devices (personal computers, terminals, smart phones, etc.) must comply with specific criteria before being granted access to network resources.
A policy-based approach to network security in which endpoint devices (personal computers, terminals, smart phones, etc.) must comply with specific criteria before being granted access to network resources.
An information assurance technique that enables reconstruction of data corrupted during storage. Erasure coding transforms and divides data into several pieces that can be stored in separate locations, such that...
An attack targeting a device that has been shut down and left unattended. The attacker physically accesses the target device without the owner’s knowledge (as an untrustworthy cleaning crew might...
President Biden’s May, 2021 formal compliance mandate for federal civilian executive branch agencies, or FCEBs, to include specific shortterm and longterm deadlines designed to enhance the federal government’s digital defense...
A system that simulates the decision-making of a human expert by applying factual or heuristic rules generated by a human subject matter expert.
(Verb) To attack a weakness in an IT system to accomplish some malicious action. (Noun) Generally refers to a specific method/procedure/software used to exploit a known vulnerability.
An operation designed to deflect attribution to an uninvolved party. A cyber operation would be a false flag if the threat actor behind it took steps to impersonate or use...