GovCybersecurityHub Editors
GovCybersecurityHub Editors
34 Articles0 Comments

e-Crime takes over cyber intrusions in 2020

2020 has presented a host of difficulties from the ongoing pandemic, to hurricanes, to an intense wildfire season. But natural disasters and pandemics weren’t the only threats to government organizations this year – a very real man-made threat also increased…

Three Steps to Exploiting a Pandemic Infographic

The excerpt from NETSCOUT’s 1H 2020 Threat Report reveals that attackers targeted COVID-era lifelines such as e-commerce, healthcare, and education with an unprecedented number of shorter, faster, more complex attacks. Fill out the form below to access the Infographic, “Three…

NETSCOUT 1H 2020 Threat Intelligence Report – Cybercrime Exploiting a Pandemic

For cybercriminals, the COVID-19 pandemic is nothing short of an outstanding business opportunity—and they have taken full advantage. Attackers targeted COVID-era lifelines such as e-commerce, healthcare, and educational services with short, complex, high-throughput attacks designed to quickly overwhelm and take…

2020 Threat Hunting Report: Insights From the CrowdStrike Overwatch Team

Falcon OverWatch, the CrowdStrike elite team of threat hunters, has the unparalleled ability to see and stop the most sophisticated threats, leaving adversaries with nowhere to hide. This report provides a summary of the OverWatch team’s threat hunting findings from the first half…

Five Steps to Take for Safer Government Networks This Cybersecurity Awareness Month

In our last article on the GovCyberHub, we featured part one of our two-part Cybersecurity Awareness Month-focused conversation with Tina Thorstenson of CrowdStrike. Tina is acutely in-tune with the cyberthreats facing public sector organizations, as she previously served as the…

Insider threat detection requires nuanced and resilient mitigation

In cybersecurity, threat actors are often viewed as far-removed adversaries looking to exploit our networks or extort our organizations for their own personal gain. But they are not always distant threats. There are also insider threats, which come from our…

WIZARD SPIDER unleashes Conti ransomware to extort millions

Threat actors continue to find new ways of disrupting life for their own financial gain. And sometimes their new ways are modifications of previously effective malware or ransomware, usually with an added punch. In the last year, the damaging Ryuk…

Joyce Hunter of ICIT discusses building a better federal cyber workforce

On October 14 and October 15, 2020, top cybersecurity experts will be coming together for the ICIT Fall Briefing 2020. This unique cybersecurity event will be a virtual hands-on collaboration project designed to teach government cybersecurity professionals how to crowdsource…

Why machine learning is the right approach for securing multi-platform data environments

The cloud’s scalability, flexibility, and cost savings have federal government agencies replacing some traditional, physical data center infrastructure with cloud services. This also led to the federal “Cloud First” mandate which required agencies to consider available cloud solutions before building…

The newest tools in the terrorist toolbox: cyberattacks and cyberwarfare

When we think about America’s adversaries in cyberspace, we think of large, near-peer nation-states with sophisticated militaries’ incredibly capable cyberwarriors at their disposal. We think of countries like Russia, China, and North Korea. But the threat against America extends beyond…