3 Ways That a Whole-of-Nation IT Approach Can Challenge Ransomware Attackers in 2022

Recently the Institute for Critical Infrastructure Technology (ICIT), known for being, “the cybersecurity think tank,” released a paper titled, “Ransomware Weaponized.” Diving into the nature of modern ransomware, the organization wrote extensively on the need for a wider and more…

New Year, New Breaches—Three modern identity attacks insights to know going into 2022

The beginning of a New Year is always a strangely quiet time for government agencies. The holidays have just ended, agency employees are slowly trickling back into work and settling back into their home offices, to sign in and begin…

The changing role of cyber resiliency planning for government agencies

The ongoing COVID-19 pandemic forced government agencies to expedite their digital transformation initiatives and embrace new technologies in an effort to enable their workforces to operate remotely. With the potential for employees to possibly get sick or perish, agencies moved…

The three weak links in the Connectivity Supply Chain and how to protect it

At NETSCOUT, we refer to all of the technologies and services that enable companies and individuals to stay connected to the internet as the Connectivity Supply Chain. This includes services that underpin all interconnected devices—enterprise Internet of Things (IoT) devices…

Three tips to secure government IT data from Quest’s Chris Roberts

There is a rising star in the world of IT and cybersecurity, it has been on the rise for years, even decades, but recent events have propelled it to even grander heights. Having a grasp on this element can make…

Four necessary considerations for securing cloud-based government IT

Government IT is unique from enterprise IT in many varied and distinct ways, however, one that transcends both the public and private sectors is the need to balance money in with money out. When looking towards a future with more…

NETSCOUT CIO shares 4 ways the digital transformation makes organizations run more effectively and securely

The digital transformation of the IT space has been one of the few bright spots over the last year and a half. Embracing the cloud and utilizing it to facilitate work has empowered organizations like never before. It was, however,…

9 Steps to make cybersecurity everyone’s duty this CSAM according to CrowdStrike

As Cybersecurity Awareness month continues on, many around the industry are reviewing many of the best practices that have helped safeguard government agencies as they have adapted to modern threats. Information security professionals have had to address a number of…

4 Considerations for a productive and focused CSAM

It’s Cybersecurity Awareness Month (CSAM), which means it’s once again time to focus on the common cyber risks and threats facing government agencies and private enterprises today. In a year overshadowed by several large attacks and the continuing move towards…

Triple Extortion Ransomware: How Agencies Can Protect Themselves

In our previous article on the GovCyberHub, we sat down with Richard Hummel, NETSCOUT’s ASERT Threat Research Lead, to discuss the evolution of cyberattacks from traditional single vectors to the increasingly pervasive triple extortion ransomware. Combining the elements of ransomware,…