The impact of the IIoT on the cybersecurity of critical infrastructure

The movement towards connected and cloud-enabled IoT devices has opened the door to many benefits and conveniences. Anyone that has turned up their heat without getting up off of their couch (and out from under a toasty blanket) will certainly…

The robot army is here – the impact of the IoT on DDoS attacks

The Terminator movies series may have jumped the shark with multiple ill-conceived sequels after the nearly flawless second movie, Terminator 2: Judgment Day, but for a sci-fi concept it actually wasn’t so far-fetched or futuristic. There really is a robot…

Commercial and industrial equipment – the overlooked government network vulnerability

When we think about or discuss the cyber threats facing government organizations and the United States military, we think about direct attacks on agency network infrastructure, ransomware attacks against schools or local governments, insider threats from malicious actors within the…

Three key DDoS findings from the NETSCOUT Threat Intelligence Report

While the seemingly increasing rash of ransomware attacks impacting government organizations and entities has dominated much of the news cycle, there is another threat that is less trendy but equally harmful to government organizations. That threat is the Distributed Denial…

The role and impact of SMBs in DoD cybersecurity

Last month, the GovCyberHub sat down with Parham Eftekhari, the Executive Director of the Institute for Critical Infrastructure Technology (ICIT), to talk about the key trends and topics of discussion at the organization’s 2019 Fall Briefing. During that discussion, Mr.…

Mobile devices – convenience, security risk or both?

Cell phones, tablets, wearables and other mobile devices dominate our lives. I personally bring my trusty iPad to everywhere, and, like everyone else, have my phone with me at all times. The biggest attack surface for any enterprise, then, may…

Why security takes a backseat in IoT devices

The “Internet of Things,” or IOT: we’ve all heard the term, but what does it really mean? More importantly, how do we secure all of these … “things”? First, a stab at defining the term and its components. The term…