Defense-in-Depth or Zero Trust: What is the Best Strategy for your Agency?

The digital transformation has had a profound impact on the way organizations operate. Long-standing security solutions have demonstrated signs of wear against the rapid speed of innovation from cybercriminals. However, one paradigm has quickly risen to be the new standard…

Three DDoS Lessons Learned from the 2H 2021 Threat Intel Report

NETSCOUT recently released the latest installment of its Threat Intelligence Report, which features the insights and information extrapolated from the data generated by NETSCOUT ASERT in their work defending the networks of government agencies and large enterprises from DDoS atatcks.…

A New Global Pandemic – Threat Intelligence Report Shows Massive Uptick in DDoS Attacks

NETSCOUT recently released its semi-annual Threat Intelligence Report with deep insights into the notably distributed denial-of-service (DDoS) and cyber activity during the second half of 2021. The report contains troves of valuable information about the ongoing threat posed to organizations…

Taking the Challenge Out of Embracing Event Logging

There has been an increased focus among U.S. government agencies on adapting to modern IT environments and enhancing cybersecurity solutions. This increased focus on security government networks, data, and critical infrastructure is a result of ongoing digital transformation initiatives that…

How Network Visibility Empowers Robust Zero Trust Cybersecurity for Government IT

It is common knowledge that any defense is only as good as its weakest link. An adversary only needs one momentary lapse in coverage to find an avenue for attack and to exploit it. This has been true for generations…

A Re-Introduction to a Zero Trust Model with NETSCOUT’s Andrew Green

By releasing last May’s “Executive Order on Improving the Nation’s Cybersecurity,”  which asked all federal agencies to put a plan on paper to embrace a zero trust approach to cybersecurity, the Biden Administration effectively illustrated that zero trust is no…

Two Ways State and Local Governments Can Use Federal Cybersecurity Funding

State Chief Information Officers (CIOs) are looking towards an uncertain future. The rising importance of hybrid work has created in equal parts tremendous opportunity and significant challenges. This upheaval has made many state and local governments prioritize creating an adequate…

Five Steps for Embracing Least Privilege in Your Organization

Recently, this publication shared four benefits of a least privilege approach to security and explained why least privilege is an important part of network security. The importance of this approach is hard to overstate but it bears repeating that as…

4 Challenges Threatening Cyber Resiliency Across Government Agencies

Steve Morgan, the founder of Cybersecurity Ventures and Editor-in-Chief of Cybercrime Magazine, once estimated that a company will be hit by ransomware every 11 seconds. That estimate was published in 2019, which might as well be a decade ago in…

Four Benefits of Adopting a Least Privilege Model

The least privilege model is something of a hot topic these days. As part of the foundation of a cybersecurity paradigm, it can provide a robust and resilient first level of defense against many comment cyberthreats. But what exactly is…