Four key cyber considerations for a post-pandemic world

This article originally appeared on the NETSCOUT blog. Click here to read the original in its entirety. The need for organizations and government agencies to shift and evolve quickly in light of the COVID-19 pandemic resulted in large-scale change for remote access…

Three Ways to Test Government Networks for DDoS Resiliency

This article was originally published on the NETSCOUT blog. Click HERE to read the original article in its entirety.Although distributed denial-of-service (DDoS) attacks have been around for more than 20 years, they remain something of a moving target as cybercriminals regularly discover…

Biden’s Cybersecurity Executive Order Should Worry Hackers

The risks that cyber threats pose to American critical infrastructures, supply chains, and government networks have been forewarned by cybersecurity experts for nearly two decades. On May 7, 2021, hackers from Eastern Europe leveraged a ransomware attack against the Colonial…

When it comes to security, not all cloud providers are equal

All federal government agencies, including the DoD, have been required to adhere to certain compliance requirements. These requirements are meant to inject consistency and confidence in the security of a cloud provider solution. And security is top of mind for…

Cloud security starts with employee training

This article was authored by Anuradha Nandan of ExitCertified and originally published on the Tech Data Blog. Click HERE to read the original article in its entirety. According to a study commissioned by the Federal Risk and Authorization Management Program, roughly half…

More scalable AND secure –Brian Schoepfle of AWS on the security benefits of government cloud initiatives

In 2011, the Office of Management and Budget (OMB) released the Federal Cloud Computing Strategy, also known as “Cloud First.” The purpose of Cloud First was to mandate the Federal Government’s transition to the cloud, which would facilitate the modernization…

Zero Trust – CrowdStrike’s Andrew Harris shares what it takes to best prepare for the future of cybersecurity strategy

Zero Trust has become a bit of a buzzword in the IT channel and though its foundation is relatively well understood, there exist considerable differences in execution. At its core, a Zero Trust cybersecurity paradigm insists that both parties in…

APIs and IaC – Two New AppSec Imperatives for Development and Security Teams

Application vulnerabilities are among the largest, most exploited vulnerabilities that hackers use to compromise and breach organizations. With applications becoming more prevalent and relied upon, the need to focus on application security becomes absolutely essential. But what many people don’t…

Four Essential Requirements for Modern Data Security

This article was originally featured on the IBM Security Intelligence blog. To read the original article in its entirety, click HERE. There is a lot of talk about ‘modern’ data security. Organizations want a data security strategy that aligns with a digitally…

Supply Chain Attacks and Vaccine Hacking – CrowdStrike Global Threat Report Reveals the New Normal in 2021

The recently released CrowdStrike 2021 Global Threat Report (GTR) provides a stark but comprehensive outline of the ongoing threat landscape facing modern cybersecurity professionals. Hot off the heels of, “a year of hardship and grief for many,” CrowdStrike’s annual report…