Joyce Hunter of ICIT discusses building a better federal cyber workforce

On October 14 and October 15, 2020, top cybersecurity experts will be coming together for the ICIT Fall Briefing 2020. This unique cybersecurity event will be a virtual hands-on collaboration project designed to teach government cybersecurity professionals how to crowdsource…

The DDoS Threat Facing the 2020 Election

While recent discussion around the upcoming U.S. presidential election has centered on the safety and efficacy of mail-in ballots, overall security concerns over the nation’s voting system remain extremely high. The decentralized nature of our election system, which is managed…

FDSIPs – protecting mission-critical networks at the tip of the spear

We’ve grown accustomed to the benefits and capabilities of having a powerful computer in our pockets. We’re increasingly dependent on devices that can interconnect and be controlled remotely. We’ve even begun to take the ability to communicate via text, voice,…

Why machine learning is the right approach for securing multi-platform data environments

The cloud’s scalability, flexibility, and cost savings have federal government agencies replacing some traditional, physical data center infrastructure with cloud services. This also led to the federal “Cloud First” mandate which required agencies to consider available cloud solutions before building…

IoT, BYOD and clouds contribute to IT complexity and asset management concerns

While it may seem like decades that we’ve been talking about the security concerns of Bring Your Own Device (BYOD), cloud implementations, and now the Internet of Things (IoT), a recent eBook authored by analyst firm, Enterprise Strategy Group (ESG),…

The three motives driving government focused DDoS Attacks

Because of the coronavirus pandemic, government cybersecurity has been tested to new limits. According to the NETSCOUT Cyber Threat Horizon, the number of DDoS attacks worldwide has gone up every month for the past three months running, or since many…

Former FBI Executive Assistant Director Shawn Henry on the Expanding Threat Environment in Government Cybersecurity

As more devices become network-enabled, the number of vectors that malicious actors can use to gain access to sensitive information have increased tremendously. And as storage has become increasingly commoditized, the amount of information and data that government agencies keep…

James Yeager Lays Out the Fed and SLED Threat Landscape in Advance of Fal.con for Public Sector

You would think that – in the midst of a global pandemic that is confirmed to have killed almost 500,000 people worldwide – that the healthcare organizations working to find a cure would be able to conduct their work and…

Ransomware Observations from 2019: The Greedy Get Greedier

Global endpoint security provider CrowdStrike recently released its much-anticipated annual Global Threat Report, which details the most significant cybersecurity events and trends of the past year. The report is compiled with details and information from the CrowdStrike Intelligence team, the…

New vectors, new techniques – the evolution of DDoS attacks

In 2012, an organized and well-planned DDoS attack managed to take down the websites of some of the world’s largest banks and financial services institutions. When that attack was perpetrated almost a decade ago, the news reports about it called…