Over the last few years, the federal government has begun to embrace a zero trust approach as the new cybersecurity standard for agencies. Utilizing the latest solutions and best practices, the hope is to bolster federal cybersecurity and create a…
How Government IT Can Plan for DDoS Attacks in 2022 and Beyond
Richard Hummel, ASERT Threat Research Lead at NETSCOUT, recently joined GovCyberHub to detail some of the topline messages from the NETSCOUT Threat Intelligence Report and shared how DDoS attacks have evolved over the second half of 2021. During our conversation, he described…
The Continuing Evolution of Cybercriminal Enterprises and the Future of Cybersecurity
The latest NETSCOUT Threat Intelligence Report is here and it seems that cybercriminals were busy in the second half of 2021. From new applications of old attacks to the continuing evolution of cybercriminal enterprises, there is a lot to dive…
Bolstering Multi-Cloud Security with Identity Management
As organizations adapt to hybrid work and more and more cloud services are deployed, new service entities that collaborate and exchange data without human interaction, such as virtual machines and containers, are proliferating. The growth of these service accounts and…
Three DDoS Lessons Learned from the 2H 2021 Threat Intel Report
NETSCOUT recently released the latest installment of its Threat Intelligence Report, which features the insights and information extrapolated from the data generated by NETSCOUT ASERT in their work defending the networks of government agencies and large enterprises from DDoS atatcks.…
Taking the Challenge Out of Embracing Event Logging
There has been an increased focus among U.S. government agencies on adapting to modern IT environments and enhancing cybersecurity solutions. This increased focus on security government networks, data, and critical infrastructure is a result of ongoing digital transformation initiatives that…
How Network Visibility Empowers Robust Zero Trust Cybersecurity for Government IT
It is common knowledge that any defense is only as good as its weakest link. An adversary only needs one momentary lapse in coverage to find an avenue for attack and to exploit it. This has been true for generations…
A Re-Introduction to a Zero Trust Model with NETSCOUT’s Andrew Green
By releasing last May’s “Executive Order on Improving the Nation’s Cybersecurity,” which asked all federal agencies to put a plan on paper to embrace a zero trust approach to cybersecurity, the Biden Administration effectively illustrated that zero trust is no…
How a Zero Trust Methodology is Helping to Redefine Government IT According to DLT’s Don Maclean
Government IT teams are worried and for good reason. Confronted by the rising threat of sophisticated cyberattacks, they are looking at an uncertain future and wondering if they have the best tools to defend their systems. When defenders create new…
Government Cybersecurity 2022 Priorities from Quest’s Chris Roberts
Government cybersecurity is at a critical junction. Faced with the rising threat of cyberattacks against physical supply chains and critical infrastructure, government agencies and organizations are looking for ways to safeguard their networks while still providing citizens with the service…