Defining Secure Software Development From power grids and advanced weapons systems to the telework-enabling apps that have kept us connected, software sits at the heart of nearly everything that keeps America running. But it does not come without risk - software supply chain attacks are
Protecting Your Most Sensitive Air Gapped Environments Zero Trust architecture is a method of designing computer networks and data centers in which granular, rule-based policies strictly control the access to network resources. In addition, Zero Trust architecture treats every incoming connection as a potential threat
A tutorial-style function embedding of the Android kernel with LSTM networks. The tutorial will discuss various technical issues, goodness metrics, network calibration, dealing with “big data,” “out-of-vocabulary” problems, etc.
John Zanni, CEO of Acronis SCS, sat down with Cyber Security Matters podcast hosts Dominic Vogel and Christian Redshaw to discuss cyber protection for the public sector. Take a listen.
This talk deals with data where records are tagged with a binary tag +1/-1. A common problem encountered by a statistical modeler is a dearth of examples in one of the two classes. This problem is common in classification, especially in anomaly detection, fraud prevention,
Why Data Backup Is so Important to the US Public Sector The best offense is a good defense when ensuring your data is protected. Adopting a resilient backup solution that integrates data protection and cybersecurity is the most foolproof method to defend the US public
The "SCS" in our company's name is there for a reason and stands for Sensitive Customer Solutions. So what constitutes a sensitive customer? That's simple. It's the US public sector. From state agencies to water treatment plants to the local nonprofit…they all have sensitive data
Confidence = Empowerment How would you answer this question – “How have you built confidence throughout your career/life?” For Women’s History Month, we posed this question to several women at Acronis SCS. We kicked off the series on March 8th in honor of International Women’s
Assisting Defense Contractors With CMMC Compliance It isn’t a matter of if, but when the Cybersecurity Maturity Model Certification (CMMC) 2.0 framework for cybersecurity compliance will be mandatory for defense contractors. It can be a daunting task to meet certification requirements and costs millions of
With cyberattacks and ransomware threats on the rise, the US public sector needs a cybersecurity and backup solution to secure vulnerable and sensitive data. Maximize your budget and operational uptime while reducing the threat of ransomware attacks by employing the advanced features of our certified