How to Build a Better Cyber Security Program for Your University

How to Build a Better Cyber Security Program for Your University

Colleges and universities face some unique challenges when it comes to building a cyber security program. From an ideological standpoint, university campuses are founded on the concept of the free and open exchange of ideas and information. However, universities today must balance this with the day-to-day reality of securing a vast range of critical data… Read More

Students learning and using computers.

2019 University Cyber Attacks: How Can You Protect Your Organization?

In 2019 university cyber attacks have been making headlines. Many colleges and universities, mainly those in the U.S. and other NATO countries, have become targets for cyber criminals and nation-state actors. In the ever-evolving cyber ecosystem, security professionals and their adversaries engage in continuous virtual combat. Cyber criminals have historically been more focused on targeting… Read More

GAO logo

GAO: Federal Agencies Still Vulnerable to Cyber Attacks

The Government Accountability Office (GAO) says in a new study, GAO-19-105: Federal Information Security, that most federal agencies are falling behind on implementing federal cyber security standards. The study said federal agencies need improvement and called on the agencies to do a better job protecting against intrusions. The GAO uses the NIST Cybersecurity Framework (CSF) to… Read More

GSA Simplifies Categories for IT-70 HACS SINs

The General Services Administration (GSA) announced changes to the Information Technology Schedule 70 (IT-70) Highly Adaptive Cybersecurity Services (HACS) Special Item Numbers (SINs) on November 14, consolidating its cyber security contract vehicles. The main change is the addition of a new sub-category covering the High Value Assets (HVAs) to be in line with Office of Management and Budget… Read More

ticketing system

Beware of These 7 Ticketing System Pitfalls

Tickets predate the well-known ticket tracking software. Long ago, the process of tracking issues by index cards were taken from analog to digital processes However, the usefulness of ticketing has waned in the past decade or so — except in organizations that jealously maintain the culture of quality ticketing. The capabilities of ticketing systems can… Read More

security assessment services

2017 Threat Monitoring, Detection, and Response Survey: Take the Survey and Get the Free Report

Delta Risk has partnered with the Information Security Community on LinkedIn to examine the latest management trends, investment priorities, key challenges, and solutions preferences for incident response, threat hunting, threat detection, threat monitoring, insider threats, incident recovery, and more. Everyone who completes this comprehensive survey will receive a copy of the complete 2017 Threat Monitoring, Detection, and Response Report as… Read More