Biden’s Cybersecurity Executive Order Should Worry Hackers

The risks that cyber threats pose to American critical infrastructures, supply chains, and government networks have been forewarned by cybersecurity experts for nearly two decades. On May 7, 2021, hackers from Eastern Europe leveraged a ransomware attack against the Colonial…

When it comes to security, not all cloud providers are equal

All federal government agencies, including the DoD, have been required to adhere to certain compliance requirements. These requirements are meant to inject consistency and confidence in the security of a cloud provider solution. And security is top of mind for…

Cloud security starts with employee training

This article was authored by Anuradha Nandan of ExitCertified and originally published on the Tech Data Blog. Click HERE to read the original article in its entirety. According to a study commissioned by the Federal Risk and Authorization Management Program, roughly half…

More scalable AND secure –Brian Schoepfle of AWS on the security benefits of government cloud initiatives

In 2011, the Office of Management and Budget (OMB) released the Federal Cloud Computing Strategy, also known as “Cloud First.” The purpose of Cloud First was to mandate the Federal Government’s transition to the cloud, which would facilitate the modernization…

Zero Trust – CrowdStrike’s Andrew Harris shares what it takes to best prepare for the future of cybersecurity strategy

Zero Trust has become a bit of a buzzword in the IT channel and though its foundation is relatively well understood, there exist considerable differences in execution. At its core, a Zero Trust cybersecurity paradigm insists that both parties in…

APIs and IaC – Two New AppSec Imperatives for Development and Security Teams

Application vulnerabilities are among the largest, most exploited vulnerabilities that hackers use to compromise and breach organizations. With applications becoming more prevalent and relied upon, the need to focus on application security becomes absolutely essential. But what many people don’t…

Four Essential Requirements for Modern Data Security

This article was originally featured on the IBM Security Intelligence blog. To read the original article in its entirety, click HERE. There is a lot of talk about ‘modern’ data security. Organizations want a data security strategy that aligns with a digitally…

Supply Chain Attacks and Vaccine Hacking – CrowdStrike Global Threat Report Reveals the New Normal in 2021

The recently released CrowdStrike 2021 Global Threat Report (GTR) provides a stark but comprehensive outline of the ongoing threat landscape facing modern cybersecurity professionals. Hot off the heels of, “a year of hardship and grief for many,” CrowdStrike’s annual report…

Five ways to protect your VPN gateway from DDoS attacks

It’s already difficult to remember when working from home wasn’t the practice for many workers. As this new reality set in, organizations of all stripes had to increasingly rely on their network connectivity to continue business-as-usual activities. According to a McKinsey survey…

Global Threat Report Shows Malicious Actors Went Big Game Hunting in 2020

Earlier this month, the global cybersecurity firm, CrowdStrike, released their 2021 Global Threat Report, which provides a detailed, in-depth picture of the current threat landscape facing organizations today, an overview of threat activity from the past year, and recommendations for…