Defining Secure Software Development From power grids and advanced weapons systems to the telework-enabling apps that have kept us connected, software sits at the heart of nearly everything that keeps America running. But it does not come without risk - software supply chain attacks are
On March 28, 2022, the White House released President Biden's $5.8 trillion proposed budget for fiscal year (FY) 2023. During President Biden’s time in office, cybersecurity has emerged as a key priority for the Administration. The President’s budget has shown a dedication to this issue
While Windows 11 enables the US public sector to create a backup image of their computers, it does not provide the full breadth of features that other third-party backup solutions do. Here is what you need to know to fully protect your organization's Windows 11
Protecting Your Most Sensitive Air Gapped Environments Zero Trust architecture is a method of designing computer networks and data centers in which granular, rule-based policies strictly control the access to network resources. In addition, Zero Trust architecture treats every incoming connection as a potential threat
A tutorial-style function embedding of the Android kernel with LSTM networks. The tutorial will discuss various technical issues, goodness metrics, network calibration, dealing with “big data,” “out-of-vocabulary” problems, etc.
John Zanni, CEO of Acronis SCS, sat down with Cyber Security Matters podcast hosts Dominic Vogel and Christian Redshaw to discuss cyber protection for the public sector. Take a listen.
How the US Public Sector Manages & Reduces Risk: Implementing the NIST 800-171 Framework & Certified Cyber Protection Lately, there’s been a lot of talk about the National Institute of Standards and Technology (NIST) Cybersecurity Framework in the media. What does it entail, and why
This talk deals with data where records are tagged with a binary tag +1/-1. A common problem encountered by a statistical modeler is a dearth of examples in one of the two classes. This problem is common in classification, especially in anomaly detection, fraud prevention,
Why Data Backup Is so Important to the US Public Sector The best offense is a good defense when ensuring your data is protected. Adopting a resilient backup solution that integrates data protection and cybersecurity is the most foolproof method to defend the US public
John Zanni, Acronis SCS CEO's Predictions for 2022 and Beyond As we continue to see the US public sector adopt permanent work models and witness the active threat of cyberattacks, one thing is clear: new cybersecurity prevention measures are crucial for the safety of the