Former FBI Executive Assistant Director Shawn Henry on the Expanding Threat Environment in Government Cybersecurity

As more devices become network-enabled, the number of vectors that malicious actors can use to gain access to sensitive information have increased tremendously. And as storage has become increasingly commoditized, the amount of information and data that government agencies keep…

CIO of the Illinois State Treasurer’s Office on the importance of executive buy-in to cyber initiatives

When we think about the types of companies and organizations that are often targets of cyberattacks, we tend to think about the companies with something that e-criminals want. These are crimes being perpetrated by criminals, after all. They wouldn’t take…

The role of AI in battling opportunistic malware and ransomware attacks

The ongoing COVID-19 pandemic in our country may be dominating the headlines, but it’s not the only threat that government agencies need to be worried about. While the nation’s attention remains focused on the coronavirus, an old foe is lurking…

31,000 potential targets – OU’s CISO describes the herculean task of protecting university networks

With an enrollment of approximately 31,000 young people – all raised on new technologies and clearly digital natives – you would think that a large university like the University of Oklahoma (OU) would have no problem keeping its networks and…

James Yeager Lays Out the Fed and SLED Threat Landscape in Advance of Fal.con for Public Sector

You would think that – in the midst of a global pandemic that is confirmed to have killed almost 500,000 people worldwide – that the healthcare organizations working to find a cure would be able to conduct their work and…

General Dynamics – Ordnance and Tactical Systems CISO Talks Best Cyber Practices in Defense Industrial Base

The movement towards remote work and digital tools over the past few months has resulted in a massive change in the amount of data flowing over networks and has drastically increased the importance of advanced IT tools and capabilities across…

Unique Government Cybersecurity Challenges and How to Solve Them

When a government entity sets its cybersecurity policy, it faces challenges that the private sector need not worry about.  “Your typical public sector CISO is as capable as their private sector counterparts,” says Rob Sheldon, CrowdStrike’s Head of Technology Strategy,…

Cyberthieves exploiting coronavirus fears spark demand for cyberwarriors

Times of crisis and uncertainty can be frightening for everyday citizens, but they’re opportunities for cyber thieves. And the ongoing coronavirus pandemic is certainly no exception. While as many as 60,000 Americans have died from COVID-19, cyber thieves have ramped…

Ransomware Observations from 2019: The Greedy Get Greedier

Global endpoint security provider CrowdStrike recently released its much-anticipated annual Global Threat Report, which details the most significant cybersecurity events and trends of the past year. The report is compiled with details and information from the CrowdStrike Intelligence team, the…

Coronavirus cyber considerations – six key factors for securing a remote workforce

With more than 4,000 reported cases, and many more anticipated by health and infectious disease experts, the Coronavirus (COVID-19) has many Americans changing their behavior, stocking up on necessities and quarantining themselves in their homes for fear of contracting the…