Leidos Cyber Blog

  • Critical Infrastructure targeted by Russian Government Cyber Activity

    Critical Infrastructure targeted by Russian Government Cyber Activity

    On March 15 2018, the Department of Homeland Security (DHS) and Federal Bureau of Investigation (FBI) released a joint Technical Alert (TA) – TA18-074A providing information on Russian.

    Read More
  • Report from the Trenches:  Defending against Targeted Spear Phishing Attacks

    Report from the Trenches:  Defending against Targeted Spear Phishing Attacks

    Spear Phishing - The fraudulent practice of sending emails ostensibly from a known or trusted sender in order to induce targeted individuals to reveal confidential information.

    Read More
  • New Passive Monitoring capabilities for Industrial Defender ASM® Launch today!

    New Passive Monitoring capabilities for Industrial Defender ASM® Launch today!

    Leidos has just enhanced its Industrial Defender ASM® to support passive monitoring of ICS assets, now combining market leading active monitoring with full passive monitoring support. Adding...

    Read More
  • Asset Visibility: Key to an Effective ICS Security Strategy

    Asset Visibility: Key to an Effective ICS Security Strategy

    With their proprietary control protocols and use of specialized hardware and software, early industrial control systems (ICS) had little resemblance to traditional information technology (IT) systems.

    Read More
  • Managed Detection & Response Solutions Respond to Need for Incident Prevention

    Managed Detection & Response Solutions Respond to Need for Incident Prevention

    Cyber attacks are rising faster than ever, resulting in malicious threats infiltrating corporate networks and just about anything technology based.

    Read More
  • Leidos named strong performer in the Forrester Wave: Information Security Consulting Services, Q3 2017

    Leidos named strong performer in the Forrester Wave: Information Security Consulting Services, Q3 2017

    The Forrester Wave™: Information Security Consulting Services, Q3 2017, evaluates 15 global cybersecurity services firms to help security and risk professionals make the right choice.

    Read More
  • Advanced situational awareness for ICS management

    Advanced situational awareness for ICS management

    At the Black Hat 2017 conference in Las Vegas, Leidos gave a sneak peek at a new product for critical infrastructure customers—Arena Asset Visibility and Insights (AVI). At the Black Hat 20

    Read More
  • Securing critical infrastructure organizations against the next cyber breach

    Securing critical infrastructure organizations against the next cyber breach

    The cyber-attack on Ukraine power centers last December — an event that took 30 substations offline and left more than 230,000 residents without power — was a rude awakening for operators worldwide

    Read More
  • Five pitfalls to avoid when building your insider risk program

    Five pitfalls to avoid when building your insider risk program

    Despite continued investments in security measures to control and monitor access to sensitive data, more organizations feel vulnerable to breaches caused by insiders

    Read More
  • Vicious to virtuous: using analysis to create an effective cyber defense

    Vicious to virtuous: using analysis to create an effective cyber defense

    An evolving threat landscape, persistent adversaries, and a shortage of talent and skills are some of the reasons security teams struggle to successfully defend their organizations.

    Read More
  • Dos and don’ts for building an effective ICS security program

    Dos and don’ts for building an effective ICS security program

    For security teams, monitoring the security status of an IT network is common practice, while the routers, switches, and gateways of industrial networks go largely unchecked. Fortunately, this is...

    Read More
  • Rapid growth through integration yields #1 spot as fastest growing cybersecurity consulting company

    Rapid growth through integration yields #1 spot as fastest growing cybersecurity consulting company

    Successful integration, motivated leaders, and driven employees propel Leidos to the #1 fastest growing cybersecurity consulting company.

    Read More
  • Leidos penetration testing programme is CREST certified

    Leidos penetration testing programme is CREST certified

    Leidos' Penetration Testing programme complies with CRESTs rigorous requirements for penetration testing providers, giving organisations a level of assurance over the quality of testing

    Read More
  • [Part 4 of 4] Why Training and Consequence Management Matter to Insider Risk Programs

    [Part 4 of 4] Why Training and Consequence Management Matter to Insider Risk Programs

    Discover why the best insider risk programs incorporate training, awareness, and defined consequence management procedures to ensure success.

    Read More
  • How to Proactively Defeat Insider Threats

    How to Proactively Defeat Insider Threats

    Why having an insider risk program should not be a question of “why” but “when.”

    Read More
  • [Part 3 of 4] What Deserves the Greatest Protection

    [Part 3 of 4] What Deserves the Greatest Protection

    Successful insider risk programs begin with good choices—prioritizing what to protect and how to protect it. Part 3: Successful insider risk programs begin with good choices—prioritizing wha

    Read More
  • [Part 2 of 4] Set the foundation for your insider risk program success

    [Part 2 of 4] Set the foundation for your insider risk program success

    Part 2: Communication and documentation contribute to building a successful insider risk program. When implementing an insider risk program, it is necessary to take foundational...

    Read More
  • [Part 1 of 4] How to kick-off your insider risk program

    [Part 1 of 4] How to kick-off your insider risk program

    Part 1: Review the first two of eight components to building a successful insider risk detection program that goes beyond network monitoring.

    Read More
  • Insider Risk: Defining the risk equation

    Insider Risk: Defining the risk equation

    To execute a successful insider risk program, the entire organization must be engaged to accurately evaluate key factors that contribute to risk: threats, vulnerabilities, and assets.

    Read More
  • 4 Insights on Global Cybersecurity Challenges Directly from the CISOs

    4 Insights on Global Cybersecurity Challenges Directly from the CISOs

    Four common threads – talent acquisition and retention; budget dollars for prevention vs. monitoring/detection/response; cybersecurity processes require consistent and repeatable processes.

    Read More
  • loading
    Loading More...