TECHNICAL ARTICLES


Blockchain Technology: Local Government Applications and Challenges
This paper illustrates the benefits and challenges of blockchain technology by exploring case studies of its application and implementation in Read more.
Center for Internet Security logo
Intel Insights: How to Secure PowerShell
If PowerShell is not needed, prevent its execution on systems after performing appropriate testing to assess the impact to the Read more.
Center for Internet Security logo
Security Primer – Ryuk
Ryuk is one of the most prevalent ransomware variants in the state, local, tribal, and territorial (SLTT) government threat landscape, Read more.
Global Information Assurance Certification logo
Attackers Inside the Walls: Detecting Malicious Activity
Small and medium-sized businesses (SMBs) do not always have the budget for an advanced intrusion detection system (IDS) technology. Open-source Read more.
Center for Internet Security logo
Security Primer – IcedID
IcedID, also known as BokBot, is a modular banking trojan that targets user financial information and is capable of acting Read more.
Center for Internet Security logo
Security Primer – Ransomware
Throughout 2019, state, local, tribal, and territorial (SLTT) government entities are increasingly encountering ransomware attacks resulting in significant network downtime, Read more.
Center for Internet Security logo
Security Primer – TrickBot
TrickBot is a modular banking trojan that targets sensitive information and acts as a dropper for other malware. Since June Read more.
Computer Security Resource Center logo
BowTie – A deep learning feedforward neural network for sentiment analysis
How to model and encode the semantics of human-written text and select the type of neural network to process it Read more.
Computer Security Resource Center logo
Internet of Things (IoT) Trust Concerns (Draft Document)
This draft white paper identifies seventeen technical trust-related issues that may negatively impact the adoption of IoT products and services. Read more.