Three DDoS Lessons Learned from the 2H 2021 Threat Intel Report

NETSCOUT recently released the latest installment of its Threat Intelligence Report, which features the insights and information extrapolated from the data generated by NETSCOUT ASERT in their work defending the networks of government agencies and large enterprises from DDoS atatcks.…

A New Global Pandemic – Threat Intelligence Report Shows Massive Uptick in DDoS Attacks

NETSCOUT recently released its semi-annual Threat Intelligence Report with deep insights into the notably distributed denial-of-service (DDoS) and cyber activity during the second half of 2021. The report contains troves of valuable information about the ongoing threat posed to organizations…

Taking the Challenge Out of Embracing Event Logging

There has been an increased focus among U.S. government agencies on adapting to modern IT environments and enhancing cybersecurity solutions. This increased focus on security government networks, data, and critical infrastructure is a result of ongoing digital transformation initiatives that…

How Network Visibility Empowers Robust Zero Trust Cybersecurity for Government IT

It is common knowledge that any defense is only as good as its weakest link. An adversary only needs one momentary lapse in coverage to find an avenue for attack and to exploit it. This has been true for generations…

A Re-Introduction to a Zero Trust Model with NETSCOUT’s Andrew Green

By releasing last May’s “Executive Order on Improving the Nation’s Cybersecurity,”  which asked all federal agencies to put a plan on paper to embrace a zero trust approach to cybersecurity, the Biden Administration effectively illustrated that zero trust is no…

Stop Cloud Breaches with an Adversary-Focused Approach to Security

This article originally appeared on the CrowdStrike Blog and can be viewed here. It should come as no surprise that as enterprise and government IT networks moved towards the cloud and decentralized their networks, attackers updated their cyberattack methods accordingly.…

3 Ways That a Whole-of-Nation IT Approach Can Challenge Ransomware Attackers in 2022

Recently the Institute for Critical Infrastructure Technology (ICIT), known for being, “the cybersecurity think tank,” released a paper titled, “Ransomware Weaponized.” Diving into the nature of modern ransomware, the organization wrote extensively on the need for a wider and more…

New Year, New Breaches—Three modern identity attacks insights to know going into 2022

The beginning of a New Year is always a strangely quiet time for government agencies. The holidays have just ended, agency employees are slowly trickling back into work and settling back into their home offices, to sign in and begin…

You’re a Mean One, Mr. Adversary

With COVID-19 keeping some families and friends apart, and supply chain issues limiting what’s available on store shelves, this might not feel like the normal holiday season to many Americans. But there is one thing that makes this holiday season…

Senior IBM leaders explain how to bolster security in the era of digital transformation

The cybersecurity threat landscape is constantly evolving, and the cyber threats facing today’s government and military organizations are becoming increasingly sophisticated. This rising threat – and some of the workplace and technology changes that are happening across all levels of…