Six Strategies to Minimize Your Agency’s IT Attack Surface

Recent events around the world have demonstrated that there are countless attack vectors which cybercriminals can exploit to gain access to your network, and your data. With cyberattacks costing their victims millions of dollars, being able to prevent these malicious…

How Government IT Can Plan for DDoS Attacks in 2022 and Beyond

Richard Hummel, ASERT Threat Research Lead at NETSCOUT, recently joined GovCyberHub to detail some of the topline messages from the NETSCOUT Threat Intelligence Report and shared how DDoS attacks have evolved over the second half of 2021. During our conversation, he described…

Five Steps for Embracing Least Privilege in Your Organization

Recently, this publication shared four benefits of a least privilege approach to security and explained why least privilege is an important part of network security. The importance of this approach is hard to overstate but it bears repeating that as…

Four Benefits of Adopting a Least Privilege Model

The least privilege model is something of a hot topic these days. As part of the foundation of a cybersecurity paradigm, it can provide a robust and resilient first level of defense against many comment cyberthreats. But what exactly is…

Stop Cloud Breaches with an Adversary-Focused Approach to Security

This article originally appeared on the CrowdStrike Blog and can be viewed here. It should come as no surprise that as enterprise and government IT networks moved towards the cloud and decentralized their networks, attackers updated their cyberattack methods accordingly.…

3 Ways That a Whole-of-Nation IT Approach Can Challenge Ransomware Attackers in 2022

Recently the Institute for Critical Infrastructure Technology (ICIT), known for being, “the cybersecurity think tank,” released a paper titled, “Ransomware Weaponized.” Diving into the nature of modern ransomware, the organization wrote extensively on the need for a wider and more…

4 Considerations for a productive and focused CSAM

It’s Cybersecurity Awareness Month (CSAM), which means it’s once again time to focus on the common cyber risks and threats facing government agencies and private enterprises today. In a year overshadowed by several large attacks and the continuing move towards…

WIZARD SPIDER unleashes Conti ransomware to extort millions

Threat actors continue to find new ways of disrupting life for their own financial gain. And sometimes their new ways are modifications of previously effective malware or ransomware, usually with an added punch. In the last year, the damaging Ryuk…

Can Analytics Help the Military Better Plan for Cyberattacks?

According to a recent report by Booz Allen Hamilton, The sheer complexity of military systems, the numerous interconnections between systems and missions, and the siloed nature of military organizations makes it difficult for the senior military leaders to quickly and…

Military Struggles to Identify Full Impact of Potential Cyber Attacks

Today’s weapon systems used by our warfighters against our largest adversaries are increasingly network-enabled. Unfortunately, the network-centric nature of these systems opens them up for cyberattack – making it possible for our adversaries to deny our military’s weapon systems when…