Defense-in-Depth or Zero Trust: What is the Best Strategy for your Agency?

The digital transformation has had a profound impact on the way organizations operate. Long-standing security solutions have demonstrated signs of wear against the rapid speed of innovation from cybercriminals. However, one paradigm has quickly risen to be the new standard…

How Network Visibility Empowers Robust Zero Trust Cybersecurity for Government IT

It is common knowledge that any defense is only as good as its weakest link. An adversary only needs one momentary lapse in coverage to find an avenue for attack and to exploit it. This has been true for generations…

A Re-Introduction to a Zero Trust Model with NETSCOUT’s Andrew Green

By releasing last May’s “Executive Order on Improving the Nation’s Cybersecurity,”  which asked all federal agencies to put a plan on paper to embrace a zero trust approach to cybersecurity, the Biden Administration effectively illustrated that zero trust is no…

Five Steps for Embracing Least Privilege in Your Organization

Recently, this publication shared four benefits of a least privilege approach to security and explained why least privilege is an important part of network security. The importance of this approach is hard to overstate but it bears repeating that as…

4 Challenges Threatening Cyber Resiliency Across Government Agencies

Steve Morgan, the founder of Cybersecurity Ventures and Editor-in-Chief of Cybercrime Magazine, once estimated that a company will be hit by ransomware every 11 seconds. That estimate was published in 2019, which might as well be a decade ago in…

Four Benefits of Adopting a Least Privilege Model

The least privilege model is something of a hot topic these days. As part of the foundation of a cybersecurity paradigm, it can provide a robust and resilient first level of defense against many comment cyberthreats. But what exactly is…

The three motives driving government focused DDoS Attacks

Because of the coronavirus pandemic, government cybersecurity has been tested to new limits. According to the NETSCOUT Cyber Threat Horizon, the number of DDoS attacks worldwide has gone up every month for the past three months running, or since many…

CIO of the Illinois State Treasurer’s Office on the importance of executive buy-in to cyber initiatives

When we think about the types of companies and organizations that are often targets of cyberattacks, we tend to think about the companies with something that e-criminals want. These are crimes being perpetrated by criminals, after all. They wouldn’t take…

31,000 potential targets – OU’s CISO describes the herculean task of protecting university networks

With an enrollment of approximately 31,000 young people – all raised on new technologies and clearly digital natives – you would think that a large university like the University of Oklahoma (OU) would have no problem keeping its networks and…

James Yeager Lays Out the Fed and SLED Threat Landscape in Advance of Fal.con for Public Sector

You would think that – in the midst of a global pandemic that is confirmed to have killed almost 500,000 people worldwide – that the healthcare organizations working to find a cure would be able to conduct their work and…