The Colonial Pipeline Hack: It’s Real, It Will Happen Again, and We Must Be Prepared

Hackers recently attacked computer systems belonging to the Colonial Pipeline company, forcing them to shut down operations and inhibiting delivery of diesel fuel, gasoline, and jet fuel throughout the East Coast of the United States.  This pipeline is not just…

Zero Trust – CrowdStrike’s Andrew Harris shares what it takes to best prepare for the future of cybersecurity strategy

Zero Trust has become a bit of a buzzword in the IT channel and though its foundation is relatively well understood, there exist considerable differences in execution. At its core, a Zero Trust cybersecurity paradigm insists that both parties in…

Three HWAM practices for building a successful CDM program

The DHS Continuous Diagnostics and Mitigation (CDM) Program is a comprehensive, risk-based security approach that enables federal agencies to quickly address threats in their environment. The CDM Program provides a dynamic approach for strengthening government networks and systems by delivering cybersecurity tools,…

APIs and IaC – Two New AppSec Imperatives for Development and Security Teams

Application vulnerabilities are among the largest, most exploited vulnerabilities that hackers use to compromise and breach organizations. With applications becoming more prevalent and relied upon, the need to focus on application security becomes absolutely essential. But what many people don’t…

When breaking records goes bad – Threat Intelligence Report shows unprecedented uptick in DDoS attacks

With the 2020 Summer Olympic Games in Tokyo postponed because of the ongoing COVID-19 pandemic, people around the globe lost out on the opportunity to see records broken in amazing, athletic displays of human potential, drive, and spirit. But while…

Exploring the strengths and weaknesses of zero trust security

This article is part of a larger piece that was originally published on IBM’s SecurityIntelligence publication. To read the original article in its entirety, click HERE. Organizations are increasingly creating zero trust policies to augment their digital security postures. According to Infosecurity…

Statecraft and tradecraft are no longer mutually exclusive in cybercrime

According to the recent CrowdStrike Global Threat Report, global cybersecurity threats continue to rise year-over-year. That is a constant that won’t likely change. However, the source of threats and their complexities are anything but moored in concrete. Both state-sponsored and…

The Plex DDoS Attack – Isolated Incident or Part of a Larger DDoS Trend?

In our last article on the GovCyberHub, we featured the first part of our two-part Q&A series with Roland Dobbins, a Principal Engineer on NETSCOUT’s ASERT Team who is Netscout’s foremost DDoS subject-matter expert and is one of the top…

Anatomy of a DDoS Attack – the Plex Media Server Reflection/Amplification Attacks

Earlier this year, NETSCOUT announced that it had identified a new attack vector that was being leveraged to launch DDoS attacks across the public Internet. The vector was a protocol incorporated into the Plex Media Server (Plex) application that –…

Ensuring Network Performance and Security During COVID-19

This article was originally featured on the NETSCOUT blog. Click HERE to read the original article in its entirety. The pandemic-driven massive shift to remote work has triggered complex technology challenges as companies wrestle with maintaining a high-quality user experience…