3 Ways That a Whole-of-Nation IT Approach Can Challenge Ransomware Attackers in 2022

Recently the Institute for Critical Infrastructure Technology (ICIT), known for being, “the cybersecurity think tank,” released a paper titled, “Ransomware Weaponized.” Diving into the nature of modern ransomware, the organization wrote extensively on the need for a wider and more…

Quest’s Chris Robert unpacks the 2021 cybersecurity landscape and discusses what to expect in 2022

Last month, the worldwide IT community recognized and celebrated Cybersecurity Awareness Month, a time where cyber professionals from around the globe reflected on the cybersecurity landscape from the past year and explored how to make online ecosystems more safe and…

Why government agencies must move beyond firewall protection as the end-all and be-all of protection

Firewalls are a critical part of the modern cybersecurity paradigm, but they are not likely to be enough to defend against many common cyberattacks. One, in particular, DDoS attacks, present a unique challenge for firewalls, according to NETSCOUT’s Richard Hummel,…

Choosing a Multifactor Authentication Technology

In the early days of computing, authentication was simple: If you wanted to log in to an IT system, you had to enter your username and password. If what you entered matched what the system had stored in its directory,…

Why a firewall, alone, won’t protect your network from DDoS attacks

In a recent interview with the GovCyberHub, NETSCOUT’s Richard Hummel spoke about the common misconception that firewalls protect federal government agencies’ networks against DDoS cyberattacks. He explained that, “Firewalls do little to protect against a DDoS attack and are designed…

Is 2021 the year that government agencies finally focus on data privacy?

A number of recent, high-profile data breaches and cyberattacks on U.S. digital infrastructure, networks, and critical infrastructure have made data privacy top-of-mind for the federal government. In light of recent attacks, including the Solarwinds breach, the Colonial Pipeline breach, and…

Biden’s Cybersecurity Executive Order Should Worry Hackers

The risks that cyber threats pose to American critical infrastructures, supply chains, and government networks have been forewarned by cybersecurity experts for nearly two decades. On May 7, 2021, hackers from Eastern Europe leveraged a ransomware attack against the Colonial…

APIs and IaC – Two New AppSec Imperatives for Development and Security Teams

Application vulnerabilities are among the largest, most exploited vulnerabilities that hackers use to compromise and breach organizations. With applications becoming more prevalent and relied upon, the need to focus on application security becomes absolutely essential. But what many people don’t…

Anatomy of a DDoS Attack – the Plex Media Server Reflection/Amplification Attacks

Earlier this year, NETSCOUT announced that it had identified a new attack vector that was being leveraged to launch DDoS attacks across the public Internet. The vector was a protocol incorporated into the Plex Media Server (Plex) application that –…

Security Considerations Drive Air Force to Get Agile

Software and applications have taken on an outsized role in today’s government – helping agencies and military organizations more effectively and efficiently accomplish their missions and service constituents. But to keep pace with innovation, stay ahead of adversaries and keep…