GovCybersecurityHub Editors
66 Articles0 Comments

Why machine learning is the right approach for securing multi-platform data environments

The cloud’s scalability, flexibility, and cost savings have federal government agencies replacing some traditional, physical data center infrastructure with cloud services. This also led to the federal “Cloud First” mandate which required agencies to consider available cloud solutions before building…

The newest tools in the terrorist toolbox: cyberattacks and cyberwarfare

When we think about America’s adversaries in cyberspace, we think of large, near-peer nation-states with sophisticated militaries’ incredibly capable cyberwarriors at their disposal. We think of countries like Russia, China, and North Korea. But the threat against America extends beyond…

Just how vulnerable is the 2020 election to outside interference?

Editor’s Note: The 2020 election is set, with both tickets identified and candidates preparing to accept their parties’ nominations at their national conventions in the coming weeks. Those national conventions will look and feel very different from years past, when…

Why increased cyber vigilance is needed within the education sector – a Q&A with Otavio Freire

Cybersecurity attacks are on the rise across all spectrums of society, including institutions of higher education. Malware, ransomware, and spear-phishing attacks against universities and colleges have increased, especially since the move to remote learning has become a necessity. Increased vigilance…

“Some Things Haven’t Changed” – Chris Wilkinson discusses the difficult task of defending government networks

Just last month, the Prime Minister of Australia, Scott Morrison, announced that his country was facing a massive cyberattack that was impacting, “Australian organizations across a range of sectors, including all levels of government, industry, political organizations, education, health, essential…

How the New Jersey Cybersecurity and Communications Integration Cell Works to Protects Against a “Cyber 9-11”

Increasingly sophisticated malicious actors can use a growing number of vectors to attack a government’s network infrastructure, and because governments, like organizations of all kinds, are more reliant on the network than ever, the prospect of a disruptive, and even…

Ohio Chief Information Officer Highlights Challenges for State Cybersecurity

All governments, be they at the federal, state, or local level, need to invest in a cybersecurity infrastructure that is vigilantly monitored and maintained.  Part of the reason is that governments of all sizes need to deal with motives and…

Former FBI Executive Assistant Director Shawn Henry on the Expanding Threat Environment in Government Cybersecurity

As more devices become network-enabled, the number of vectors that malicious actors can use to gain access to sensitive information have increased tremendously. And as storage has become increasingly commoditized, the amount of information and data that government agencies keep…

The role of AI in battling opportunistic malware and ransomware attacks

The ongoing COVID-19 pandemic in our country may be dominating the headlines, but it’s not the only threat that government agencies need to be worried about. While the nation’s attention remains focused on the coronavirus, an old foe is lurking…

31,000 potential targets – OU’s CISO describes the herculean task of protecting university networks

With an enrollment of approximately 31,000 young people – all raised on new technologies and clearly digital natives – you would think that a large university like the University of Oklahoma (OU) would have no problem keeping its networks and…