News

Ever since NIST published NIST SP 800-207 in 2020, setting forth Zero Trust Architecture (ZTA) as a means to combat both internal and external threats, the adoption of ZTA has accelerated, driven by a ...
Enterprise attack surfaces are expanding rapidly. To keep up, cybersecurity must evolve—moving from siloed tools to unified, ...
Enigma Networks, a cybersecurity software developer based in Exton, provides protection against artificial intelligence-driven network threats, writes Joseph N. DiStefano for The Philadelphia Inquirer ...
A newly disclosed DHS memo outlines how a months-long breach by suspected Chinese hackers could jeopardize cybersecurity ...
Securing U.S. nuclear infrastructure remains a hot-button topic, especially because it remains an attractive cyberattack target for nation-state adversaries. Former ...
Going forward, all U.S. forces must now assume their networks are compromised and will be degraded,” a former Air National Guard servicemember said.
Chinese hackers stole network diagrams, credentials, and personnel data in a breach that poses a threat to critical ...
A Department of Homeland Security memo from June, describing the Pentagon’s findings, said that the group, publicly known by ...
Bad guys don’t hack anymore. They log right in” and do their damage quietly, says Bob Moul, who’s run half a dozen Philly-area software companies. Artificial intelligence software, using powerful ...
This paper proposes a post-disaster cyber-physical interdependent restoration scheduling (CPIRS) framework for active distribution networks (ADN) where the simultaneous damages on cyber and physical ...