General Dynamics – Ordnance and Tactical Systems CISO Talks Best Cyber Practices in Defense Industrial Base

The movement towards remote work and digital tools over the past few months has resulted in a massive change in the amount of data flowing over networks and has drastically increased the importance of advanced IT tools and capabilities across…

Unique Government Cybersecurity Challenges and How to Solve Them

When a government entity sets its cybersecurity policy, it faces challenges that the private sector need not worry about.  “Your typical public sector CISO is as capable as their private sector counterparts,” says Rob Sheldon, CrowdStrike’s Head of Technology Strategy,…

Cyberthieves exploiting coronavirus fears spark demand for cyberwarriors

Times of crisis and uncertainty can be frightening for everyday citizens, but they’re opportunities for cyber thieves. And the ongoing coronavirus pandemic is certainly no exception. While as many as 60,000 Americans have died from COVID-19, cyber thieves have ramped…

Nine tips for avoiding COVID-19 cyber schemes

This article was written by Shawn Henry, the President and CSO of CrowdStrike Services. Prior to joining CrowdStrike, Henry worked with the FBI, where he was credited with boosting the bureau’s computer crime and cybersecurity investigative capabilities. This excerpt is…

TransUnion shares the warning signs and financial impact of an insider threat

When people think about cybersecurity and protecting a company, organization or government agency’s networks and data, they picture cyberwarriors doing battle against sophisticated hackers, opposing nation states or hacktivist groups. And while that’s certainly part of the job, they often…

CMMC V1.0 – what is it and will it work?

Last week, my associate, Shane Rogers, shared an article on the GovCybersecurityHub discussing the Cybersecurity Maturity Model Certification (CMMC) and its potential impact on small- and medium-sized government contractors. Shane concluded that the Department of Defense (DoD) is taking incredible…

CMMC for SMBs – What should smaller contractors expect?

On January 31, 2020, the Honorable Ellen Lord, who currently serves as the Under Secretary of Defense for Acquisition and Sustainment, delivered the opening statement at the beginning of the official press briefing for the release of Cybersecurity Maturity Model…

The insider threat – the vulnerability that’s coming from inside the house

The insider threat: it’s one of the biggest and most persistent issues in cybersecurity. There have been multiple, recent high-profile cases – Manning, Snowden, and others. And these cases have both kept the issue in the public eye and kept…

The role and impact of SMBs in DoD cybersecurity

Last month, the GovCyberHub sat down with Parham Eftekhari, the Executive Director of the Institute for Critical Infrastructure Technology (ICIT), to talk about the key trends and topics of discussion at the organization’s 2019 Fall Briefing. During that discussion, Mr.…

Why leadership is essential for government cybersecurity – a Q&A with ICIT

The federal government is facing a confluence of factors that make defending their networks increasingly difficult at a time when the number and sophistication of the malicious actors attacking them is only increasing. That’s what we heard when we recently…