Cybersecurity is no longer considered a problem to be solved – it’s now a risk to be managed. Over the last decade, the cybersecurity landscape has solidified itself as a primary component of any government agency’s IT infrastructure. With today’s…
Why government agencies must move beyond firewall protection as the end-all and be-all of protection
Firewalls are a critical part of the modern cybersecurity paradigm, but they are not likely to be enough to defend against many common cyberattacks. One, in particular, DDoS attacks, present a unique challenge for firewalls, according to NETSCOUT’s Richard Hummel,…
NETSCOUT CIO shares 4 ways the digital transformation makes organizations run more effectively and securely
The digital transformation of the IT space has been one of the few bright spots over the last year and a half. Embracing the cloud and utilizing it to facilitate work has empowered organizations like never before. It was, however,…
Federal Zero Trust: Agencies have questions, Quest and DLT have answers
In the last few years, there has been a dramatic increase in both the number and sophistication levels of cyberattacks against federal agencies. And with a record number of federal employees relying on remote work technologies, agency network perimeters are…
Why a firewall, alone, won’t protect your network from DDoS attacks
In a recent interview with the GovCyberHub, NETSCOUT’s Richard Hummel spoke about the common misconception that firewalls protect federal government agencies’ networks against DDoS cyberattacks. He explained that, “Firewalls do little to protect against a DDoS attack and are designed…
Is 2021 the year that government agencies finally focus on data privacy?
A number of recent, high-profile data breaches and cyberattacks on U.S. digital infrastructure, networks, and critical infrastructure have made data privacy top-of-mind for the federal government. In light of recent attacks, including the Solarwinds breach, the Colonial Pipeline breach, and…
When it comes to security, not all cloud providers are equal
All federal government agencies, including the DoD, have been required to adhere to certain compliance requirements. These requirements are meant to inject consistency and confidence in the security of a cloud provider solution. And security is top of mind for…
CIO of the Illinois State Treasurer’s Office on the importance of executive buy-in to cyber initiatives
When we think about the types of companies and organizations that are often targets of cyberattacks, we tend to think about the companies with something that e-criminals want. These are crimes being perpetrated by criminals, after all. They wouldn’t take…
James Yeager Lays Out the Fed and SLED Threat Landscape in Advance of Fal.con for Public Sector
You would think that – in the midst of a global pandemic that is confirmed to have killed almost 500,000 people worldwide – that the healthcare organizations working to find a cure would be able to conduct their work and…
Why recent cybersecurity legislation is just window dressing
Representative Ro Khanna (D-Calif.) recently introduced cybersecurity legislation that would, “mandate Congress [to] direct OMB to require cybersecurity training for federal employees and include information on the risks of Internet of Things (IoT) devices…” On the surface, this seems like…