This article originally appeared on One Identity by Quest’s official blog, here. While government agency networks continue to grow and increase their number of network users, access points, permissions, and privileges, their cyberattack surfaces are inevitably going to expand alongside…
New Year, New Breaches—Three modern identity attacks insights to know going into 2022
The beginning of a New Year is always a strangely quiet time for government agencies. The holidays have just ended, agency employees are slowly trickling back into work and settling back into their home offices, to sign in and begin…
Five ways to spot a phishing attack
Phishing has existed for almost two decades – and for very good reason. Everyone can be targeted by it. It’s still just as effective as ever. And there’s really no way for surefire way for security professionals to keep every…
Fal.Con for Public Sector 2021: OMB’s CISO on where things stand since cybersecurity EO release
For cybersecurity professionals, 2021 has been a year that’s witnessed decades of fears and worries coming to fruition. The year began with panic, as IT professionals dizzyingly reeled and reacted to the massive SolarWinds and Microsoft Exchange Server breaches. In…
Four key cyber considerations for a post-pandemic world
This article originally appeared on the NETSCOUT blog. Click here to read the original in its entirety. The need for organizations and government agencies to shift and evolve quickly in light of the COVID-19 pandemic resulted in large-scale change for remote access…
The CMMC and continuous monitoring – is it a good idea?
In April of this year, the CMMC advisory board issued an interesting RFP that caught a few off guard and raised a lot of questions among the defense industrial base (DIB). That RFP involved the creation of a continuous monitoring…
31,000 potential targets – OU’s CISO describes the herculean task of protecting university networks
With an enrollment of approximately 31,000 young people – all raised on new technologies and clearly digital natives – you would think that a large university like the University of Oklahoma (OU) would have no problem keeping its networks and…
James Yeager Lays Out the Fed and SLED Threat Landscape in Advance of Fal.con for Public Sector
You would think that – in the midst of a global pandemic that is confirmed to have killed almost 500,000 people worldwide – that the healthcare organizations working to find a cure would be able to conduct their work and…
General Dynamics – Ordnance and Tactical Systems CISO Talks Best Cyber Practices in Defense Industrial Base
The movement towards remote work and digital tools over the past few months has resulted in a massive change in the amount of data flowing over networks and has drastically increased the importance of advanced IT tools and capabilities across…
Unique Government Cybersecurity Challenges and How to Solve Them
When a government entity sets its cybersecurity policy, it faces challenges that the private sector need not worry about. “Your typical public sector CISO is as capable as their private sector counterparts,” says Rob Sheldon, CrowdStrike’s Head of Technology Strategy,…