A Re-Introduction to a Zero Trust Model with NETSCOUT’s Andrew Green

By releasing last May’s “Executive Order on Improving the Nation’s Cybersecurity,”  which asked all federal agencies to put a plan on paper to embrace a zero trust approach to cybersecurity, the Biden Administration effectively illustrated that zero trust is no…

Two Ways State and Local Governments Can Use Federal Cybersecurity Funding

State Chief Information Officers (CIOs) are looking towards an uncertain future. The rising importance of hybrid work has created in equal parts tremendous opportunity and significant challenges. This upheaval has made many state and local governments prioritize creating an adequate…

How a Zero Trust Methodology is Helping to Redefine Government IT According to DLT’s Don Maclean

Government IT teams are worried and for good reason. Confronted by the rising threat of sophisticated cyberattacks, they are looking at an uncertain future and wondering if they have the best tools to defend their systems. When defenders create new…

Government Cybersecurity 2022 Priorities from Quest’s Chris Roberts

Government cybersecurity is at a critical junction. Faced with the rising threat of cyberattacks against physical supply chains and critical infrastructure, government agencies and organizations are looking for ways to safeguard their networks while still providing citizens with the service…

Quest’s Chris Roberts Shares Four Tenets for Securing Government Networks in 2022

Experts anticipate that cybersecurity will be just as large of a challenge and a priority for government networks in 2022 as it was last year. Ultimately, as government agencies have embraced digital transformation initiatives that have fundamentally altered how they…

White House Highlights Zero Trust in 2022 Government Cybersecurity

Late last month, the Office of Management and Budget (OMB) released a memorandum that offered updated security guidance for federal agencies. Guidance issued by OMB lays the framework or foundation for how federal civilian agencies should operate. And this new…

Five Characteristics of an Effective Common Cybersecurity Technology Stack

This article is part of a larger piece that was published on the NETSCOUT blog. To read the original in its entirety, click HERE. The last few years have seen several far-reaching cyberattacks against our nation’s critical infrastructure and essential…

Stop Cloud Breaches with an Adversary-Focused Approach to Security

This article originally appeared on the CrowdStrike Blog and can be viewed here. It should come as no surprise that as enterprise and government IT networks moved towards the cloud and decentralized their networks, attackers updated their cyberattack methods accordingly.…

3 Ways That a Whole-of-Nation IT Approach Can Challenge Ransomware Attackers in 2022

Recently the Institute for Critical Infrastructure Technology (ICIT), known for being, “the cybersecurity think tank,” released a paper titled, “Ransomware Weaponized.” Diving into the nature of modern ransomware, the organization wrote extensively on the need for a wider and more…

New Year, New Breaches—Three modern identity attacks insights to know going into 2022

The beginning of a New Year is always a strangely quiet time for government agencies. The holidays have just ended, agency employees are slowly trickling back into work and settling back into their home offices, to sign in and begin…