Three COVID Network Visibility Challenges and How to Solve Them

Over the past year, many organizations have worked hard to embrace digital transformation and have done so with both remarkable speed and efficiency. It should be noted that these efforts were in process long before the current pandemic, but COVID-19…

Fal.Con for Public Sector 2021: OMB’s CISO on where things stand since cybersecurity EO release

For cybersecurity professionals, 2021 has been a year that’s witnessed decades of fears and worries coming to fruition. The year began with panic, as IT professionals dizzyingly reeled and reacted to the massive SolarWinds and Microsoft Exchange Server breaches. In…

Why a firewall, alone, won’t protect your network from DDoS attacks

In a recent interview with the GovCyberHub, NETSCOUT’s Richard Hummel spoke about the common misconception that firewalls protect federal government agencies’ networks against DDoS cyberattacks. He explained that, “Firewalls do little to protect against a DDoS attack and are designed…

Could the Kaseya ransomware attack have been prevented? A Q&A with Chris Roberts of Quest

July 4th, typically a day of celebration full of good drinks, foods, and friends, was marred this year by a successful ransomware attack that utilized Kaseya software as an attack vector. The attack, perpetrated by REvil, targeted managed service providers…

Is 2021 the year that government agencies finally focus on data privacy?

A number of recent, high-profile data breaches and cyberattacks on U.S. digital infrastructure, networks, and critical infrastructure have made data privacy top-of-mind for the federal government. In light of recent attacks, including the Solarwinds breach, the Colonial Pipeline breach, and…

Four steps for fostering NetSecOps – network and security collaboration

According to, “A Guide to NetOps and SecOps Collaboration,” a recent white paper from Enterprise Management Associates (EMA), 35 percent of network operations teams say security system problems, such as bad policies and device failures, have led to complex and…

IBM’s Jason Keenaghan on the rising importance of zero trust cybersecurity

In a year full of high-profile cyberattacks, it should come as no surprise that the zero trust cybersecurity approach has become the standard across both the private and public sectors. The recent cybersecurity-focused executive order from the Biden Administration expressly…

Government Digital Transformation and Modernization in Just Three Easy Steps

The need for modernized information technology at government agencies is long-established, but progress toward transformation is often slow-moving. As recently as 2019, the Government Accountability Office found that 10 critical systems at 10 agencies were eight to 51 years old.…

Four key cyber considerations for a post-pandemic world

This article originally appeared on the NETSCOUT blog. Click here to read the original in its entirety. The need for organizations and government agencies to shift and evolve quickly in light of the COVID-19 pandemic resulted in large-scale change for remote access…

Three Ways to Test Government Networks for DDoS Resiliency

This article was originally published on the NETSCOUT blog. Click HERE to read the original article in its entirety.Although distributed denial-of-service (DDoS) attacks have been around for more than 20 years, they remain something of a moving target as cybercriminals regularly discover…