Why schools are getting an “F” in cybersecurity

Right before the holiday season, California’s Tulare Joint Union High School District received a very unwelcome gift – a cyberattack. The attack, which was coined, “very bad and complicated,” by the district’s assistant superintendent, Lucy VanScyoc, in an emailed statement…

The Zero Trust model and data-loss prevention

In a previous article on the GovCyberHub, I wrote about the Zero Trust model for security. There are many areas of cybersecurity that complement the Zero Trust model – and data security is one. Outside of the IoT world, the…

Easy targets? Why healthcare and government ransomware attacks are on the rise

Earlier this month it was reported that an Alabama-based health system had fallen prey to a ransomware attack. The healthcare organization, DCH Health System, was ultimately forced to pay off malicious actors that perpetuated an attack that drastically impacted business…

Zero Trust: Buzzword or hack-buster?

Trust but verify: a Russian proverb Ronald Reagan often used to characterize U.S.-Russia relations, especially regarding nuclear weapons. The Internet has made it clear that the “trust” part of the proverb may not work so well. Today, we may have…

Blockchain and supply chain risk management

“Build it in, don’t bolt it on,” is a mantra that we all learn when we study cybersecurity. Unfortunately, we see it in practice far too rarely. Our adversaries also know this principle, and have begun to implement it by…

Global Threat Report helps in the fight against government-focused ransomware

Imagine walking into work on a Friday morning – with the weekend just one more workday away – and finding that your computer systems and data aren’t accessible. That was the reality for more than 20 cities and government agencies…

Polymorphic defense – making your systems “moving targets”

In my recent article on the GovCybersecurityHub entitled, “Solid foundations + innovation = stout cybersecurity,” I talked about cybersecurity can be somewhat unfair. That’s because the economies of scale favor our adversaries. I also talked about the importance of security…

Cyber threats worsen, so the market opportunity grows

  Cybersecurity endures as a top priority for federal agencies, the Trump administration and Congress. So whatever other budget battles that might lie ahead, cyber will remain an important opportunity. In fact, two recent reports ought to scare the heck…

What Steps Can the Military Take to Secure Weapon Systems?

Today’s military platforms and weapon systems are increasingly network and software-enabled, which is helping to make them more effective and efficient tools for the warfighter, but is opening them up to a new avenue of attacks that less connected and…

Could Adversaries Hack Weapon Systems? It’s Certainly Possible…

Much of the same evolution that we’re seeing in our own vehicles – including the emergence of autonomous vehicles and smarter, more connected vehicles – is occurring, in parallel, in military vehicles and weapons platforms. There is barely a single…