[Part 1 of 4] How to kick-off your insider risk program
Part 1: Review the first two of eight components to building a successful insider risk detection program th...
Other content in this Stream
#Innovidual Bob Riepshoff
We’re a company full of innovative individuals, or as we call them, #innoviduals. This month’s #innovidual is Bob Riepshoff, Chief Architect of our DISA GSM-O program and a Leidos Technical Fellow.
Every cloud has a cybersecurity lining
Leidos Cyber Principal Consultants Siobhan Moran and Brett Young joined TIA NOW to discuss the key security challenges facing enterprise networks as they move through the cloud/SDN transition phase.
Innovating in an age of change: A Q&A with Angela Heise
As president of our Civil group, Heise leads a team that is helping shape the infrastructure of the future for public and private sector organizations serving important missions.
'Cyber bullets' were once a spy tool but may soon scan wi-fi networks for the Army
Advanced battlefield cyber capabilities were once only reserved for the most highly trained and secretive forces, but now these tools and concepts are emerging from the shadows where they originated.
Critical Infrastructure targeted by Russian Government Cyber Activity
On March 15 2018, the Department of Homeland Security (DHS) and Federal Bureau of Investigation (FBI) released a joint Technical Alert (TA) – TA18-074A providing information on Russian.
Report from the Trenches: Defending against Targeted Spear Phishing Attacks
Spear Phishing - The fraudulent practice of sending emails ostensibly from a known or trusted sender in order to induce targeted individuals to reveal confidential information.
New Passive Monitoring capabilities for Industrial Defender ASM® Launch today!
Leidos has just enhanced its Industrial Defender ASM® to support passive monitoring of ICS assets, now combining market leading active monitoring with full passive monitoring support. Adding...
Asset Visibility: Key to an Effective ICS Security Strategy
With their proprietary control protocols and use of specialized hardware and software, early industrial control systems (ICS) had little resemblance to traditional information technology (IT) systems.
Managed Detection & Response Solutions Respond to Need for Incident Prevention
Cyber attacks are rising faster than ever, resulting in malicious threats infiltrating corporate networks and just about anything technology based.
Building a healthy connection between technology and people: An interview with Jon Scholl
The Leidos Health group president discusses how the company is taking the lead in health care technology, and what’s next for the industry overall.
Leidos named strong performer in the Forrester Wave: Information Security Consulting Services, Q3 2017
The Forrester Wave™: Information Security Consulting Services, Q3 2017, evaluates 15 global cybersecurity services firms to help security and risk professionals make the right choice.
The Cyber Workforce, Part 5: What does success look like?
Over the course of this series, we've discussed the need for more cybersecurity professionals and how we must look for new talent to build dynamic teams. But what does success look like?
Securing critical infrastructure organizations against the next cyber breach
The cyber-attack on Ukraine power centers last December — an event that took 30 substations offline and left more than 230,000 residents without power — was a rude awakening for operators worldwide
Five pitfalls to avoid when building your insider risk program
Despite continued investments in security measures to control and monitor access to sensitive data, more organizations feel vulnerable to breaches caused by insiders
Vicious to virtuous: using analysis to create an effective cyber defense
An evolving threat landscape, persistent adversaries, and a shortage of talent and skills are some of the reasons security teams struggle to successfully defend their organizations.
Assess, transition and refine your cyber posture
Massive cyberattacks are occurring with greater frequency. In response, it is imperative for all organisations to assess their cyber posture and risk tolerance.
Meeting the challenges of an uncertain world: An interview with CEO Roger Krone
After nearly 50 years of tackling the world’s most complex problems — addressing challenges in the defense, intelligence, civil and health care markets — Krone still sees blue skies ahead for Leidos.
Advanced situational awareness for ICS management
At the Black Hat 2017 conference in Las Vegas, Leidos gave a sneak peek at a new product for critical infrastructure customers—Arena Asset Visibility and Insights (AVI). At the Black Hat 20
Securing Government against tomorrow’s threats: an interview with Leidos CIO, Steve Hull
Steve speaks with Federal News Radio on how Leidos does its cybersecurity and then derives lessons that can be applied to the federal government.
What does Leidos do? Part 8: Cyber