Cyberthieves exploiting coronavirus fears spark demand for cyberwarriors

Times of crisis and uncertainty can be frightening for everyday citizens, but they’re opportunities for cyber thieves. And the ongoing coronavirus pandemic is certainly no exception. While as many as 60,000 Americans have died from COVID-19, cyber thieves have ramped…

Ransomware Observations from 2019: The Greedy Get Greedier

Global endpoint security provider CrowdStrike recently released its much-anticipated annual Global Threat Report, which details the most significant cybersecurity events and trends of the past year. The report is compiled with details and information from the CrowdStrike Intelligence team, the…

The robot army is here – the impact of the IoT on DDoS attacks

The Terminator movies series may have jumped the shark with multiple ill-conceived sequels after the nearly flawless second movie, Terminator 2: Judgment Day, but for a sci-fi concept it actually wasn’t so far-fetched or futuristic. There really is a robot…

Commercial and industrial equipment – the overlooked government network vulnerability

When we think about or discuss the cyber threats facing government organizations and the United States military, we think about direct attacks on agency network infrastructure, ransomware attacks against schools or local governments, insider threats from malicious actors within the…

New vectors, new techniques – the evolution of DDoS attacks

In 2012, an organized and well-planned DDoS attack managed to take down the websites of some of the world’s largest banks and financial services institutions. When that attack was perpetrated almost a decade ago, the news reports about it called…

TransUnion shares the warning signs and financial impact of an insider threat

When people think about cybersecurity and protecting a company, organization or government agency’s networks and data, they picture cyberwarriors doing battle against sophisticated hackers, opposing nation states or hacktivist groups. And while that’s certainly part of the job, they often…

Coronavirus cyber considerations – six key factors for securing a remote workforce

With more than 4,000 reported cases, and many more anticipated by health and infectious disease experts, the Coronavirus (COVID-19) has many Americans changing their behavior, stocking up on necessities and quarantining themselves in their homes for fear of contracting the…

Why recent cybersecurity legislation is just window dressing

Representative Ro Khanna (D-Calif.) recently introduced cybersecurity legislation that would, “mandate Congress [to] direct OMB to require cybersecurity training for federal employees and include information on the risks of Internet of Things (IoT) devices…” On the surface, this seems like…

The role and impact of SMBs in DoD cybersecurity

Last month, the GovCyberHub sat down with Parham Eftekhari, the Executive Director of the Institute for Critical Infrastructure Technology (ICIT), to talk about the key trends and topics of discussion at the organization’s 2019 Fall Briefing. During that discussion, Mr.…

Polymorphic defense – making your systems “moving targets”

In my recent article on the GovCybersecurityHub entitled, “Solid foundations + innovation = stout cybersecurity,” I talked about cybersecurity can be somewhat unfair. That’s because the economies of scale favor our adversaries. I also talked about the importance of security…