National Cybersecurity Strategy: Disrupting and Dismantling Threat Actors Will Not Come Easy

National Cybersecurity Strategy: Disrupting and Dismantling Threat Actors Will Not Come Easy

|
Continuing a review of the new National Cybersecurity Strategy, today I look at the second pillar, Disrupt and Dismantle Threat Actors. It’s heavy on collaboration, information sharing, and integrated response, and lays out five objectives that, on the surface, make sense:  Integrate Federal Disruption Activities Enhance Public-Private Operational Collaboration to ... Read More
STIGs, FIPS, ZT, and API Security

STIGs, FIPS, ZT, and API Security

| | Public Sector
Leading by Example The United States has been a leader in information technology for decades, and the U.S. government has been a major driver in that arena from the start. Considering the sensitivity of data shared between agencies, as well as how lucrative that data is to cybercriminals, the government ... Read More
A Former FBI Agent’s Thoughts: National Cybersecurity Strategy

A Former FBI Agent’s Thoughts: National Cybersecurity Strategy

|
The government just released its new National Cybersecurity Strategy built around five pillars: Pillar One: Defend Critical Infrastructure Pillar Two: Disrupt and Dismantle Threat Actors Pillar Three: Shape Market Forces to Drive Security and Resilience Pillar Four: Invest in a Resilient Future Pillar Five: Forge International Partnerships to Pursue Shared ... Read More
Forrester Identifies API Security as an Important Technology Category in a Zero Trust Architecture

Forrester Identifies API Security as an Important Technology Category in a Zero Trust Architecture

| | Public Sector
The global research firm, Forrester, recently published its latest Forrester Tech Tide™(1) focused on twenty technologies that underpin Zero Trust threat prevention. By analyzing business value and maturity of each technology , Forrester zeroed in on six in which they recommended businesses invest.  Forrester ensured each recommended technology met three ... Read More
Stolen Future: How Data Theft Dilutes Our Growth Trajectory

Stolen Future: How Data Theft Dilutes Our Growth Trajectory

| | Public Sector
During my 34-year career in federal law enforcement, I repeatedly saw the damage data theft caused to unsuspecting victims. Whether the result was an elderly retiree losing their life savings, a company losing its intellectual property, or the military losing technology that took years to research and billions of dollars ... Read More
Application Programming Interfaces (APIs): The Soft Underbelly of Zero Trust

Application Programming Interfaces (APIs): The Soft Underbelly of Zero Trust

| | Public Sector
Zero Trust is a great framework to protect our IT assets, operations, and data.  It has gained a lot of attention and many followers since the idea was first introduced by John Kindervag, and it has helped organizations as they mature their respective IT security programs.  Even government agencies were ... Read More
Former Military Officer and FBI Agent Dean Phillips joins Noname Security

Former Military Officer and FBI Agent Dean Phillips joins Noname Security

|
As both a military officer and FBI Agent, I (Dean Phillips) took an oath to defend the Constitution from enemies, foreign and domestic. The Constitution provides a framework for Democracy and the rule of law; it’s imperative to our way of life. The need for robust defense against threats to ... Read More