CA Proposes $100 Million Cyber Boost for Community Colleges May 4, 2022 Proposed Cybersecurity Funding for Community Colleges From large universities to small grade schools, educational institutions...
Defining Secure Software Development April 28, 2022 Defining Secure Software Development From power grids and advanced weapons systems to the telework-enabling apps...
The Biden Administration’s FY 2023 Budgetary Commitment to Funding Cybersecurity April 27, 2022 On March 28, 2022, the White House released President Biden's $5.8 trillion proposed budget for...
Windows 11 Backup – Is It the Only Backup Your Organization Needs? April 20, 2022 While Windows 11 enables the US public sector to create a backup image of their...
Protecting Your Most Sensitive Air Gapped Environments April 19, 2022 Protecting Your Most Sensitive Air Gapped Environments Zero Trust architecture is a method of designing...
VIDEO–Tyler Thatcher at Acronis SCS MI Lab: Function Embedding and Software Vulnerability April 15, 2022 A tutorial-style function embedding of the Android kernel with LSTM networks. The tutorial will discuss various technical...
Cyber Protection for the Public Sector: An Interview With John Zanni, CEO of Acronis SCS April 13, 2022 John Zanni, CEO of Acronis SCS, sat down with Cyber Security Matters podcast hosts Dominic...
Implementing the NIST 800-171 Framework & Certified Cyber Protection April 13, 2022 How the US Public Sector Manages & Reduces Risk: Implementing the NIST 800-171 Framework &...
VIDEO–Joe Barr at Acronis SCS MI Lab: On Unbalanced Data April 6, 2022 This talk deals with data where records are tagged with a binary tag +1/-1. A...
Why Data Backup Is so Important to the US Public Sector April 1, 2022 Why Data Backup Is so Important to the US Public Sector The best offense is...