As the digital transformation continues to change how business is done day to day, many organizations are searching for data modeling tools that meet their new needs. Public sector organizations and federal agencies, much like their private sector partners, must…
How Government IT Can Plan for DDoS Attacks in 2022 and Beyond
Richard Hummel, ASERT Threat Research Lead at NETSCOUT, recently joined GovCyberHub to detail some of the topline messages from the NETSCOUT Threat Intelligence Report and shared how DDoS attacks have evolved over the second half of 2021. During our conversation, he described…
The Continuing Evolution of Cybercriminal Enterprises and the Future of Cybersecurity
The latest NETSCOUT Threat Intelligence Report is here and it seems that cybercriminals were busy in the second half of 2021. From new applications of old attacks to the continuing evolution of cybercriminal enterprises, there is a lot to dive…
Bolstering Multi-Cloud Security with Identity Management
As organizations adapt to hybrid work and more and more cloud services are deployed, new service entities that collaborate and exchange data without human interaction, such as virtual machines and containers, are proliferating. The growth of these service accounts and…
With Reliable Document Management, Government IT can be Both Efficient and Secure
This article originally appeared in GovDevSecOpsHub and can be found here. Up until recently, the federal government was among the biggest consumers of paper, using it as a way to safely and securely store information without fear of prying eyes.…
Bolstering Application Security with Identity Governance
At its core, application onboarding is the use of software that can manage, and grant users access to applications as long as they have the proper permission and roles. More importantly, this puts applications under the jurisdiction of an identity…
Defense-in-Depth or Zero Trust: What is the Best Strategy for your Agency?
The digital transformation has had a profound impact on the way organizations operate. Long-standing security solutions have demonstrated signs of wear against the rapid speed of innovation from cybercriminals. However, one paradigm has quickly risen to be the new standard…
Four Best Practices for Leveraging the Cloud for Data Protection
Everything is not the same for applications and data, so why treat everything the same for cloud cyber security and data protection? This question was the primary driver of a recent webinar hosted by Quest, titled Best Practices for Using…
A New Global Pandemic – Threat Intelligence Report Shows Massive Uptick in DDoS Attacks
NETSCOUT recently released its semi-annual Threat Intelligence Report with deep insights into the notably distributed denial-of-service (DDoS) and cyber activity during the second half of 2021. The report contains troves of valuable information about the ongoing threat posed to organizations…