e-Crime takes over cyber intrusions in 2020

2020 has presented a host of difficulties from the ongoing pandemic, to hurricanes, to an intense wildfire season. But natural disasters and pandemics weren’t the only threats to government organizations this year – a very real man-made threat also increased…

Insider threat detection requires nuanced and resilient mitigation

In cybersecurity, threat actors are often viewed as far-removed adversaries looking to exploit our networks or extort our organizations for their own personal gain. But they are not always distant threats. There are also insider threats, which come from our…

WIZARD SPIDER unleashes Conti ransomware to extort millions

Threat actors continue to find new ways of disrupting life for their own financial gain. And sometimes their new ways are modifications of previously effective malware or ransomware, usually with an added punch. In the last year, the damaging Ryuk…

Just how vulnerable is the 2020 election to outside interference?

Editor’s Note: The 2020 election is set, with both tickets identified and candidates preparing to accept their parties’ nominations at their national conventions in the coming weeks. Those national conventions will look and feel very different from years past, when…

Why schools are getting an “F” in cybersecurity

Right before the holiday season, California’s Tulare Joint Union High School District received a very unwelcome gift – a cyberattack. The attack, which was coined, “very bad and complicated,” by the district’s assistant superintendent, Lucy VanScyoc, in an emailed statement…

System and asset management in the age of IoT

Asset management can be a massive challenge for government agencies. Many government agencies – particularly large agencies – face enormous obstacles when creating inventories of the software and hardware under their purview. The difficulty is understandable: I know of one…

Why leadership is essential for government cybersecurity – a Q&A with ICIT

The federal government is facing a confluence of factors that make defending their networks increasingly difficult at a time when the number and sophistication of the malicious actors attacking them is only increasing. That’s what we heard when we recently…