News


Making IT happen

Partner Post: Xage Security's Blog on the National Renewable Energy Laboratory Releases First Clean Energy Cybersecurity Accelerator Report

The U.S. Department of Energy’s National Renewable Energy Laboratory (NREL) has released a public report outlining the procedures and outcomes of the first cohort of the NREL-led Clean Energy Cybersecurity Accelerator (CECA) program. Xage Security was one of three cybersecurity solution providers to participate in the first CECA cohort.

Partner Post: Anthology's Blog on Empowering Government Agencies with Anthology's Innovative Approach to Course Design and Accessibility

Author: Celena Westlund, Senior Marketing Manager for Business and Government Anthology In the fast-paced world of training and development, agility and adaptability are paramount. With a staggering 73% of learning and development teams in the U.S. consisting of 10 or fewer members, and over twenty million civilian federal, state, and local government employees, the challenges of building effective training courses for mission success are abundantly clear. Anthology, formerly known as Blackboard, understands the complexities involved in this endeavor and has risen to the occasion by creating tools that are not only responsive but also transformative.

Partner Post: ZeroFox's Blog on Understanding External Cybersecurity in the US Public Sector: Shifting Mindsets, Teams, and Tools to Address Today’s Threats Outside the Perimeter

By Keren Cummins Federal intelligence teams have been monitoring “external cybersecurity” for decades. Whether attempting to find chatter about vulnerabilities on the dark web or uncovering plans to attack an agency network, the external attack surface is a well understood battleground with well understood threat actors. So, what has changed in “external cybersecurity” in the context of today’s threat environment, and why should every government agency be prioritizing it as part of their security strategy? At ZeroFox we like to think of “external cybersecurity” as referring to a new attack surface formed by “gray space.” As opposed to red space (adversary infrastructure) or blue space (organizational infrastructure), gray space is the internet infrastructure, applications, platforms, and forums that are typically managed by third parties.

Partner Post: Anthology's Blog on the Importance of Empowering Instructors for Responsible AI Adoption

By Jim Chalex and Nicolaas Matthijs With the recent widespread availability of generative AI technology, many institutional leaders are faced with a fundamental strategic question: how can the efficiencies of AI be leveraged without jeopardizing academic integrity? We are actively discussing this challenge with clients worldwide and have released our Trustworthy AI Approach to provide full transparency on Anthology’s approach to AI, including how it informs product development. A central pillar of this is what we call “humans in control”, meaning our global education community can choose whether to adopt AI-powered capabilities within our solutions—and the timeline for adoption—based on their institution’s policies and preferences.

Partner Post: Anthology's Blog on Breaking Down Barriers: How Anthology Ally is Making Learning Accessible for All

Author: Celena Westlund, Senior Marketing Manager for Business and Government Anthology Using Anthology® Ally, organizations can create more inclusive learning environments by empowering adult learners with the ability to choose digital content options that work for them. The translation capabilities of Ally help organizations break down language barriers and make their content accessible worldwide.

Partner Post: MixMode's Blog on Understanding and Implementing Biden’s National Cybersecurity Strategy

By Joe Ariganello The Biden-Harris Administration has released the National Cybersecurity Strategy Implementation Plan (NCSIP), outlining its commitment to improving cybersecurity in America. The plan focuses on two primary shifts: allocating more responsibility for mitigating cyber risk to capable entities in the public and private sectors and increasing incentives for long-term investments in cybersecurity.

Subscribe

Subscribe to our newsletter for the latest industry news, events and promotions