In our previous article on the GovCyberHub, we sat down with Richard Hummel, NETSCOUT’s ASERT Threat Research Lead, to discuss the evolution of cyberattacks from traditional single vectors to the increasingly pervasive triple extortion ransomware. Combining the elements of ransomware,…
An Introduction to Triple Extortion Ransomware with NETSCOUT’s Richard Hummel
Richard Hummel, NETSCOUT’s ASERT Threat Research Lead, understands what is at stake when an organization is the victim of a ransomware attack. “I’ve got a long history of helping customers deal with ransomware, and now DDoS as well.” Hummel, who…
Safeguard your data against a ransomware attack with these ten data protection principles
Last month, it was announced that a vulnerability in a remote management and monitoring tool utilized by many managed service providers (MSPs) had been exploited to launch a massive ransomware attack that impacted not only those MSPs but possibly their…
How Application-Layer Encryption Closes the Gaps in Disk Encryption
This article was originally featured on the Ubiq blog. To read the original in its entirety, click HERE. As cliché as it sounds, data is a company’s most valuable commodity and cyber threat actors are taking increasingly drastic steps to…
Four Ways DevSecOps Improves Application Security
Data breaches occur so frequently that it wouldn’t be surprising if the average American is becoming desensitized to them. It would be even less surprising if they’ve failed to notice that breaches are happening more frequently as cyberattacks increase in…
Why a new approach to encryption is essential for today’s government applications
Over the past decade, the role of software in the federal government has evolved from something that increased operational efficiency or made life easier, to completely mission-critical to agencies and military organizations. Software is key to federal digital transformation initiatives,…
Mobile devices – convenience, security risk or both?
Cell phones, tablets, wearables and other mobile devices dominate our lives. I personally bring my trusty iPad to everywhere, and, like everyone else, have my phone with me at all times. The biggest attack surface for any enterprise, then, may…
The Zero Trust model and data-loss prevention
In a previous article on the GovCyberHub, I wrote about the Zero Trust model for security. There are many areas of cybersecurity that complement the Zero Trust model – and data security is one. Outside of the IoT world, the…