Blockchain Technology: Local Government Applications and Challenges

Posted Posted in Technical Articles

This paper illustrates the benefits and challenges of blockchain technology by exploring case studies of its application and implementation in U.S. local governments as well as in other levels of government internationally. Consistent with the experience that emerging technologies may create efficiencies in service delivery, this research shines light on the importance of data organization […]

Center for Internet Security logo

Intel Insights: How to Secure PowerShell

Posted Posted in Technical Articles

If PowerShell is not needed, prevent its execution on systems after performing appropriate testing to assess the impact to the environment. This may not always be possible since this is a legitimate tool and has administrative functions. Restrict PowerShell in these cases through execution policy to administrators and execute signed scripts only. Depending on environmental […]

Center for Internet Security logo

Security Primer – Ryuk

Posted Posted in Technical Articles

Ryuk is one of the most prevalent ransomware variants in the state, local, tribal, and territorial (SLTT) government threat landscape, with infections doubling from the second to the third quarter in 2019. Ransomware infections continue to increase in tandem with overall impact and monetary demands. Furthermore, Ryuk’s ability to delete shadow copies and backups makes […]