Five ways to spot a phishing attack

Phishing has existed for almost two decades – and for very good reason. Everyone can be targeted by it. It’s still just as effective as ever. And there’s really no way for surefire way for security professionals to keep every…

GovCyberHub Podcast – Can government agencies get cyber insurance?

Large-scale cyberattacks are no longer rare in the news cycle. Your standard frontpage news is highlighting a new cyberattack seemingly every day due to the frequency and severity of the breaches of 2021. That’s because cyber threats are getting more…

GovCyberHub Podcast – What exactly IS cybersecurity insurance?

In our last GovCyberHub Podcast, we sat down with two experts from CrowdStrike – Deborah Blyth and Adam Cottini – to discuss the cyberthreat landscape facing state and local government agencies, and how the increased threat is making cybersecurity insurance…

GovCyberHub Podcast – Does the government need cyber insurance?

According to IBM’s annual “Cost of a Data Breach Report,” the average cost of a cyberattack in 2021, “…rose from $3.86 million to $4.24 million, the highest average total cost in the history of [the] report.” And that exponential increase…

9 Steps to make cybersecurity everyone’s duty this CSAM according to CrowdStrike

As Cybersecurity Awareness month continues on, many around the industry are reviewing many of the best practices that have helped safeguard government agencies as they have adapted to modern threats. Information security professionals have had to address a number of…

Deborah Blyth on the Lessons Learned During Seven Years as Colorado CISO

While fighting wars is almost exclusively the responsibility of the U.S. Department of Defense, today’s state and local governments find themselves on the front lines of a battle. And, unfortunately for them, it’s a battle where they’re constantly on the…

Kaseya Cyberattack: A preview of things to come?

On July 4th, 2021, a cyberattack occurred that made use of a zero-day vulnerability present in Kaseya software to gain access to a multitude of desktops. The ransomware attack demonstrated a number of new and innovative exploits that are deeply…

Biden’s Cybersecurity Executive Order Should Worry Hackers

The risks that cyber threats pose to American critical infrastructures, supply chains, and government networks have been forewarned by cybersecurity experts for nearly two decades. On May 7, 2021, hackers from Eastern Europe leveraged a ransomware attack against the Colonial…

Zero Trust – CrowdStrike’s Andrew Harris shares what it takes to best prepare for the future of cybersecurity strategy

Zero Trust has become a bit of a buzzword in the IT channel and though its foundation is relatively well understood, there exist considerable differences in execution. At its core, a Zero Trust cybersecurity paradigm insists that both parties in…

Statecraft and tradecraft are no longer mutually exclusive in cybercrime

According to the recent CrowdStrike Global Threat Report, global cybersecurity threats continue to rise year-over-year. That is a constant that won’t likely change. However, the source of threats and their complexities are anything but moored in concrete. Both state-sponsored and…