Dr. Andreas Weigend to give “data dilemma” keynote address at Quest EMPOWER 2021

As federal government agencies become more innovative with their data, it is critical that they have comprehensive knowledge of the latest trends, best practices, and technologies for their data systems. That is why Quest is holding its first annual Quest…

4 Considerations for a productive and focused CSAM

It’s Cybersecurity Awareness Month (CSAM), which means it’s once again time to focus on the common cyber risks and threats facing government agencies and private enterprises today. In a year overshadowed by several large attacks and the continuing move towards…

Deborah Blyth on the Lessons Learned During Seven Years as Colorado CISO

While fighting wars is almost exclusively the responsibility of the U.S. Department of Defense, today’s state and local governments find themselves on the front lines of a battle. And, unfortunately for them, it’s a battle where they’re constantly on the…

Triple Extortion Ransomware: How Agencies Can Protect Themselves

In our previous article on the GovCyberHub, we sat down with Richard Hummel, NETSCOUT’s ASERT Threat Research Lead, to discuss the evolution of cyberattacks from traditional single vectors to the increasingly pervasive triple extortion ransomware. Combining the elements of ransomware,…

An Introduction to Triple Extortion Ransomware with NETSCOUT’s Richard Hummel

Richard Hummel, NETSCOUT’s ASERT Threat Research Lead, understands what is at stake when an organization is the victim of a ransomware attack. “I’ve got a long history of helping customers deal with ransomware, and now DDoS as well.” Hummel, who…

Three COVID Network Visibility Challenges and How to Solve Them

Over the past year, many organizations have worked hard to embrace digital transformation and have done so with both remarkable speed and efficiency. It should be noted that these efforts were in process long before the current pandemic, but COVID-19…

CISA NRMC AD shares five steps for getting our nation’s cyber risk under control

Recently, CrowdStrike held its annual Fal.Con for Public Sector Conference, which brings together leaders and decision-makers from across the public sector, education, and industry to discuss protecting and managing government data and networks. The Fal.Con for Public Sector Conference featured…

Fal.Con for Public Sector 2021: OMB’s CISO on where things stand since cybersecurity EO release

For cybersecurity professionals, 2021 has been a year that’s witnessed decades of fears and worries coming to fruition. The year began with panic, as IT professionals dizzyingly reeled and reacted to the massive SolarWinds and Microsoft Exchange Server breaches. In…

Kaseya Cyberattack: A preview of things to come?

On July 4th, 2021, a cyberattack occurred that made use of a zero-day vulnerability present in Kaseya software to gain access to a multitude of desktops. The ransomware attack demonstrated a number of new and innovative exploits that are deeply…

Could the Kaseya ransomware attack have been prevented? A Q&A with Chris Roberts of Quest

July 4th, typically a day of celebration full of good drinks, foods, and friends, was marred this year by a successful ransomware attack that utilized Kaseya software as an attack vector. The attack, perpetrated by REvil, targeted managed service providers…