Ransomware has been a prominent threat to government agencies, enterprises, and individuals alike since the mid-2000s. In 2017, the FBI’s Internet Crime Complaint Center (IC3) received 1,783 ransomware complaints that cost victims over $2.3 million. Those complaints, however, represent only the…
Federal government looks to bolster cybersecurity infrastructures due to heightened security threats
This article originally appeared on the official DLT Solutions blog. The heightened threat of retaliatory cyberattacks by Russia against critical U.S. IT infrastructure is prompting federal investments in cybersecurity to strengthen its cyber defense posture. The ongoing conflict in the…
DBAs, Data Owners, and the Security Team—Distinguishing the Key Players Who Keep SLED Data Safe
In a previous article on the GovCyberHub, we were joined by Amit Parikh, an Information Management Senior Consultant at Quest Software, who discussed the new reality facing state and local government Database Administrators (DBAs) and explained how advanced workload analytics…
How the U.S. Government Can Stop Cyber Threats Emerging from the Ukraine-Russia Conflict
This article originally appeared on the official DLT Solutions blog. Though the Ukraine-Russia conflict began when the Russian military invaded Ukraine last February, the cybersecurity and cyber warfare elements of this conflict began long before initial combat action. Ukraine was…
Microsoft’s Federal Security CTO on the impact of OMB’s zero trust strategy
Last January, the Office of Management and Budget (OMB) released M-22-09, a memorandum that set forth the federal government strategy on zero trust adoption, in an effort to reinforce the security and protection of government agencies’ critical systems, networks, and…
Why Digital Transformation is Good for Constituents, but Bad for DBAs
The day-to-day of a database administrator (DBA) working for a state, local, or municipal government or agency has changed significantly in the past few years. The digital transformation initiatives that became incredibly pervasive in the days following the start of…
How Government IT Can Plan for DDoS Attacks in 2022 and Beyond
Richard Hummel, ASERT Threat Research Lead at NETSCOUT, recently joined GovCyberHub to detail some of the topline messages from the NETSCOUT Threat Intelligence Report and shared how DDoS attacks have evolved over the second half of 2021. During our conversation, he described…
The Continuing Evolution of Cybercriminal Enterprises and the Future of Cybersecurity
The latest NETSCOUT Threat Intelligence Report is here and it seems that cybercriminals were busy in the second half of 2021. From new applications of old attacks to the continuing evolution of cybercriminal enterprises, there is a lot to dive…
Four Best Practices for Leveraging the Cloud for Data Protection
Everything is not the same for applications and data, so why treat everything the same for cloud cyber security and data protection? This question was the primary driver of a recent webinar hosted by Quest, titled Best Practices for Using…