Ryan Schradin
58 Articles0 Comments

A communications expert and journalist with over a decade of experience, Ryan has edited and contributed to multiple popular online trade publications focused on the security, satellite, unified communications and network infrastructure industries. He serves as a contributing writer for the Gov Cyber Hub. In addition to his work with the Hub, he serves as the Executive Editor of the Government Satellite Report and the Insurance Technology Insider (ITI) online publications. In his spare time, he enjoys hiking across the great state of Virginia with his wife, Sarah, and their rescue pup, Brooklyn the Adventure Dog, who is 13lbs of pure furry fury.

With Reliable Document Management, Government IT can be Both Efficient and Secure

This article originally appeared in GovDevSecOpsHub and can be found here. Up until recently, the federal government was among the biggest consumers of paper, using it as a way to safely and securely store information without fear of prying eyes.…

Improving Cyber Situational Awareness with Compliance Automation

Today’s federal government and military are facing workforce shortages and vacancies in many important positions. However, none of these vacancies are as potentially harmful to the security of our nation as the shortages that exist in our federal cybersecurity workforce.…

Cloud Navigator – Charting a Course to More Secure IT Solutions

This article was originally published on GovDevSecOpsHub, that article can be found here. Today it is quite uncontroversial to say that the cloud is here and that it is not going anywhere anytime soon. Two years ago, this was a…

Five ways to spot a phishing attack

Phishing has existed for almost two decades – and for very good reason. Everyone can be targeted by it. It’s still just as effective as ever. And there’s really no way for surefire way for security professionals to keep every…

Deborah Blyth on the Lessons Learned During Seven Years as Colorado CISO

While fighting wars is almost exclusively the responsibility of the U.S. Department of Defense, today’s state and local governments find themselves on the front lines of a battle. And, unfortunately for them, it’s a battle where they’re constantly on the…

Threat Intelligence Report Shows the Bad Side of Innovation

Earlier today, NETSCOUT’s ATLAS Security Engineering and Response Team (ASERT) released their Threat Intelligence Report featuring findings from 1H 2021. The report analyzes the data generated by NETSCOUT ASERT in their work defending the networks of government agencies and large…

CISA NRMC AD shares five steps for getting our nation’s cyber risk under control

Recently, CrowdStrike held its annual Fal.Con for Public Sector Conference, which brings together leaders and decision-makers from across the public sector, education, and industry to discuss protecting and managing government data and networks. The Fal.Con for Public Sector Conference featured…

Safeguard your data against a ransomware attack with these ten data protection principles

Last month, it was announced that a vulnerability in a remote management and monitoring tool utilized by many managed service providers (MSPs) had been exploited to launch a massive ransomware attack that impacted not only those MSPs but possibly their…

NIST, NSA, DoD, or HHS – which zero trust recommendation makes the most sense?

In May of this year, the Biden Administration released an executive order focusing on cybersecurity that mandated government agencies put a zero trust plan on paper within 60 days. This executive order certainly made headlines within and around the Beltway,…

Government Digital Transformation and Modernization in Just Three Easy Steps

The need for modernized information technology at government agencies is long-established, but progress toward transformation is often slow-moving. As recently as 2019, the Government Accountability Office found that 10 critical systems at 10 agencies were eight to 51 years old.…