Is 2021 the year that government agencies finally focus on data privacy?

A number of recent, high-profile data breaches and cyberattacks on U.S. digital infrastructure, networks, and critical infrastructure have made data privacy top-of-mind for the federal government. In light of recent attacks, including the Solarwinds breach, the Colonial Pipeline breach, and…

Government Digital Transformation and Modernization in Just Three Easy Steps

The need for modernized information technology at government agencies is long-established, but progress toward transformation is often slow-moving. As recently as 2019, the Government Accountability Office found that 10 critical systems at 10 agencies were eight to 51 years old.…

Finding a cure for cyberattacks against the healthcare industry

This article originally appeared on the NETSCOUT blog. To read the original in its entirety, click HERE. The most recent NETSCOUT Threat Intelligence Report has found that vital pandemic industries, such as healthcare, experienced increased attention from malicious actors, while the global Lazarus…

Three HWAM practices for building a successful CDM program

The DHS Continuous Diagnostics and Mitigation (CDM) Program is a comprehensive, risk-based security approach that enables federal agencies to quickly address threats in their environment. The CDM Program provides a dynamic approach for strengthening government networks and systems by delivering cybersecurity tools,…

2020 broke DDoS attack records and 2021 is on track to break even more

Last year, the COVID-19 pandemic forced federal government agencies and military organizations to fundamentally shift how they operate. As the COVID-19 pandemic reached our shores and began spreading, federal civilian and military organizations were forced to rush to embrace VPNs,…

COVID-19 Sparked a Global DDoS Crisis in the First Half of 2020

At this point, everyone is well aware of the global health risks of the ongoing COVID-19 pandemic. So far, more than 1 million people have been killed by the virus around the world, and almost 37 million have been infected…

FDSIPs – protecting mission-critical networks at the tip of the spear

We’ve grown accustomed to the benefits and capabilities of having a powerful computer in our pockets. We’re increasingly dependent on devices that can interconnect and be controlled remotely. We’ve even begun to take the ability to communicate via text, voice,…

The impact of the IIoT on the cybersecurity of critical infrastructure

The movement towards connected and cloud-enabled IoT devices has opened the door to many benefits and conveniences. Anyone that has turned up their heat without getting up off of their couch (and out from under a toasty blanket) will certainly…

The robot army is here – the impact of the IoT on DDoS attacks

The Terminator movies series may have jumped the shark with multiple ill-conceived sequels after the nearly flawless second movie, Terminator 2: Judgment Day, but for a sci-fi concept it actually wasn’t so far-fetched or futuristic. There really is a robot…

Commercial and industrial equipment – the overlooked government network vulnerability

When we think about or discuss the cyber threats facing government organizations and the United States military, we think about direct attacks on agency network infrastructure, ransomware attacks against schools or local governments, insider threats from malicious actors within the…