The three motives driving government focused DDoS Attacks

Because of the coronavirus pandemic, government cybersecurity has been tested to new limits. According to the NETSCOUT Cyber Threat Horizon, the number of DDoS attacks worldwide has gone up every month for the past three months running, or since many…

Former FBI Executive Assistant Director Shawn Henry on the Expanding Threat Environment in Government Cybersecurity

As more devices become network-enabled, the number of vectors that malicious actors can use to gain access to sensitive information have increased tremendously. And as storage has become increasingly commoditized, the amount of information and data that government agencies keep…

James Yeager Lays Out the Fed and SLED Threat Landscape in Advance of Fal.con for Public Sector

You would think that – in the midst of a global pandemic that is confirmed to have killed almost 500,000 people worldwide – that the healthcare organizations working to find a cure would be able to conduct their work and…

Ransomware Observations from 2019: The Greedy Get Greedier

Global endpoint security provider CrowdStrike recently released its much-anticipated annual Global Threat Report, which details the most significant cybersecurity events and trends of the past year. The report is compiled with details and information from the CrowdStrike Intelligence team, the…

New vectors, new techniques – the evolution of DDoS attacks

In 2012, an organized and well-planned DDoS attack managed to take down the websites of some of the world’s largest banks and financial services institutions. When that attack was perpetrated almost a decade ago, the news reports about it called…

Why schools are getting an “F” in cybersecurity

Right before the holiday season, California’s Tulare Joint Union High School District received a very unwelcome gift – a cyberattack. The attack, which was coined, “very bad and complicated,” by the district’s assistant superintendent, Lucy VanScyoc, in an emailed statement…

The Zero Trust model and data-loss prevention

In a previous article on the GovCyberHub, I wrote about the Zero Trust model for security. There are many areas of cybersecurity that complement the Zero Trust model – and data security is one. Outside of the IoT world, the…

Easy targets? Why healthcare and government ransomware attacks are on the rise

Earlier this month it was reported that an Alabama-based health system had fallen prey to a ransomware attack. The healthcare organization, DCH Health System, was ultimately forced to pay off malicious actors that perpetuated an attack that drastically impacted business…

Zero Trust: Buzzword or hack-buster?

Trust but verify: a Russian proverb Ronald Reagan often used to characterize U.S.-Russia relations, especially regarding nuclear weapons. The Internet has made it clear that the “trust” part of the proverb may not work so well. Today, we may have…

Blockchain and supply chain risk management

“Build it in, don’t bolt it on,” is a mantra that we all learn when we study cybersecurity. Unfortunately, we see it in practice far too rarely. Our adversaries also know this principle, and have begun to implement it by…