Adopting strong passwords, MFA, and using password managers are tools you can use to protect your accounts while increasing cybersecurity.
Insider Threat: Bystander Engagement
Bystanders can play a role in helping organizations to identify insider threats. Bystanders include colleagues, human resources personnel, and supervisors.
Cybersecurity Afterschool Club Was a Hit
During the first club meeting, the IBSS team provided an introduction of cybersecurity and facilitated hands-on exercises to help the students understand the concepts. They presented the CIA Triad using a bank example.
Exploring a Modern ICAM Solution with ZTA Principles
Malicious actors gained access to information pertaining to high profile targets for at least 8 months or longer. Not just affecting the U.S. government, the attack reached hundreds of organizations including universities, governments in Europe, and large private sector companies like Microsoft and Equifax.
IBSS Spins Off Total Assure, A Commercial Entity Meeting Small and Medium-Sized Business Needs
While a separate business, Total Assure will carry IBSS’ passion for excellence to the commercial world.
IBSS Awarded Task to Provide Cybersecurity Consulting Services
IBSS was awarded a contract with the National Telecommunications and Information Administration (NTIA), Office of Policy Coordination and Management (OPCM), Information Technology Division (ITD) to provide cybersecurity consulting services to analyze alternatives and...
IBSS Awarded GSA HACS
The HACS SIN was designed specifically to help Federal agencies acquire pre-qualified cybersecurity services rapidly and efficiently in response to current and emerging IT security challenges to their High Value Assets (HVA).
IBSS Wins Department of Commerce (DOC) and National Oceanic and Atmospheric Administration (NOAA) ICAM Awards
When the DOC announced its intention to replace enterprise legacy credentialing systems with a single, robust, and scalable solution for all Line Offices nationwide, NOAA endorsed our design.
IBSS Sponsored CyberMaryland Conference
During the conference, which demonstrated how a variety of mathematical concepts are applied to cybersecurity and how mathematics is necessary to meet the cybersecurity objectives of confidentiality, integrity, and availability.