Five Characteristics of an Effective Common Cybersecurity Technology Stack

This article is part of a larger piece that was published on the NETSCOUT blog. To read the original in its entirety, click HERE. The last few years have seen several far-reaching cyberattacks against our nation’s critical infrastructure and essential…

Three COVID Network Visibility Challenges and How to Solve Them

Over the past year, many organizations have worked hard to embrace digital transformation and have done so with both remarkable speed and efficiency. It should be noted that these efforts were in process long before the current pandemic, but COVID-19…

Could the Kaseya ransomware attack have been prevented? A Q&A with Chris Roberts of Quest

July 4th, typically a day of celebration full of good drinks, foods, and friends, was marred this year by a successful ransomware attack that utilized Kaseya software as an attack vector. The attack, perpetrated by REvil, targeted managed service providers…

Cloud security starts with employee training

This article was authored by Anuradha Nandan of ExitCertified and originally published on the Tech Data Blog. Click HERE to read the original article in its entirety. According to a study commissioned by the Federal Risk and Authorization Management Program, roughly half…

Zero Trust: Buzzword or hack-buster?

Trust but verify: a Russian proverb Ronald Reagan often used to characterize U.S.-Russia relations, especially regarding nuclear weapons. The Internet has made it clear that the “trust” part of the proverb may not work so well. Today, we may have…

Why leadership is essential for government cybersecurity – a Q&A with ICIT

The federal government is facing a confluence of factors that make defending their networks increasingly difficult at a time when the number and sophistication of the malicious actors attacking them is only increasing. That’s what we heard when we recently…

Zero Trust: Buzzword or hack-buster?

Trust but verify: a Russian proverb Ronald Reagan often used to characterize U.S.-Russia relations, especially regarding nuclear weapons. The Internet has made it clear that the “trust” part of the proverb may not work so well. Today, we may have…

With cloud migration rampant, it’s time to take cloud security seriously

There’s good reason why the cloud migrations are among the top priorities for government CIOs and IT departments today. The benefits of the cloud are numerous and impossible to ignore. The cloud gives the government increased scalability and flexibility in…