Federal government looks to bolster cybersecurity infrastructures due to heightened security threats

This article originally appeared on the official DLT Solutions blog. The heightened threat of retaliatory cyberattacks by Russia against critical U.S. IT infrastructure is prompting federal investments in cybersecurity to strengthen its cyber defense posture. The ongoing conflict in the…

DBAs, Data Owners, and the Security Team—Distinguishing the Key Players Who Keep SLED Data Safe

In a previous article on the GovCyberHub, we were joined by Amit Parikh, an Information Management Senior Consultant at Quest Software, who discussed the new reality facing state and local government Database Administrators (DBAs) and explained how advanced workload analytics…

How the U.S. Government Can Stop Cyber Threats Emerging from the Ukraine-Russia Conflict

This article originally appeared on the official DLT Solutions blog. Though the Ukraine-Russia conflict began when the Russian military invaded Ukraine last February, the cybersecurity and cyber warfare elements of this conflict began long before initial combat action. Ukraine was…

Microsoft’s Federal Security CTO on the impact of OMB’s zero trust strategy

Last January, the Office of Management and Budget (OMB) released M-22-09, a memorandum that set forth the federal government strategy on zero trust adoption, in an effort to reinforce the security and protection of government agencies’ critical systems, networks, and…

Why Digital Transformation is Good for Constituents, but Bad for DBAs

The day-to-day of a database administrator (DBA) working for a state, local, or municipal government or agency has changed significantly in the past few years. The digital transformation initiatives that became incredibly pervasive in the days following the start of…

How Government IT Can Plan for DDoS Attacks in 2022 and Beyond

Richard Hummel, ASERT Threat Research Lead at NETSCOUT, recently joined GovCyberHub to detail some of the topline messages from the NETSCOUT Threat Intelligence Report and shared how DDoS attacks have evolved over the second half of 2021. During our conversation, he described…

The Continuing Evolution of Cybercriminal Enterprises and the Future of Cybersecurity

The latest NETSCOUT Threat Intelligence Report is here and it seems that cybercriminals were busy in the second half of 2021. From new applications of old attacks to the continuing evolution of cybercriminal enterprises, there is a lot to dive…

A 360-Degree Outlook on the Cybersecurity Landscape

Cybersecurity is no longer considered a problem to be solved – it’s now a risk to be managed. Over the last decade, the cybersecurity landscape has solidified itself as a primary component of any government agency’s IT infrastructure. With today’s…

Four Best Practices for Leveraging the Cloud for Data Protection

Everything is not the same for applications and data, so why treat everything the same for cloud cyber security and data protection? This question was the primary driver of a recent webinar hosted by Quest, titled Best Practices for Using…

Three DDoS Lessons Learned from the 2H 2021 Threat Intel Report

NETSCOUT recently released the latest installment of its Threat Intelligence Report, which features the insights and information extrapolated from the data generated by NETSCOUT ASERT in their work defending the networks of government agencies and large enterprises from DDoS atatcks.…