GovCybersecurityHub Editors
GovCybersecurityHub Editors
26 Articles0 Comments

Why machine learning is the right approach for securing multi-platform data environments

The cloud’s scalability, flexibility, and cost savings have federal government agencies replacing some traditional, physical data center infrastructure with cloud services. This also led to the federal “Cloud First” mandate which required agencies to consider available cloud solutions before building…

The newest tools in the terrorist toolbox: cyberattacks and cyberwarfare

When we think about America’s adversaries in cyberspace, we think of large, near-peer nation-states with sophisticated militaries’ incredibly capable cyberwarriors at their disposal. We think of countries like Russia, China, and North Korea. But the threat against America extends beyond…

CrowdStrike 2020 Global Threat Report

The 2020 Global Threat Report is one of the industry’s most highly anticipated reports on today’s most significant cyber threats and adversaries. It features a comprehensive overview of the global investigations and deep analysis conducted by the CrowdStrike® Intelligence team,…

Enhanced Cyber Readiness: Cloudera’s platform-based approach strengthens federal cyber posture

Cyberattacks are on the rise, as adversarial states and state-sponsored actors pivot quickly to take advantage of current events, including the disruptions associated with the COVID-19 pandemic. Cybersecurity is a significant problem for government agencies —a problem tailor made for…

2020 Asset Management Trends: As IT Complexity Increases, Visibility Plummets

IT infrastructure barely resembles what it looked like just 5 years ago: More than 50 percent of all VMs now reside in the cloud Employees turn to an average of four devices to conduct work IoT devices will exceed all…

Practical Use Cases for SOAR

Automation is part of our everyday lives. Yet where security is concerned, organizations are holding back. Some 59 percent of organizations said they use low levels or no automation of key security and incident response (IR) tasks, according to a…

Best Practices for Security Monitoring During a Crisis

The COVID-19 outbreak has forced the hands of many organizations around the world to have their workforce switch to remote working. This presents a huge challenge to security and infrastructure teams to enable remote working at scale while maintaining their…

Security Intelligence and Analytics in the Public Sector: Focus On The Mission At Hand

As state agencies, civilian agencies and military branches grow more dependent on systems and communications in cyberspace, defending the underlying infrastructure and information and the data it transports is absolutely essential to our nation’s security and well-being. Cyber threats are…

Compromised Credentials Monitoring: The Flashpoint Advantage

Flashpoint Compromised Credentials Monitoring (CCM) allows users to monitor exposure of compromised credentials for their employee and customer email addresses to take action after breaches to mitigate risk of account takeover (ATO). First to Access Fresh Breach Data: Ability to…