Why federal agencies must prioritize zero trust workforce training before FY24 deadline

This article originally appeared on Government Technology Insider. It’s no secret that the U.S. federal government operates in one of the world’s most threatened IT environments. When evaluating today’s federal cybersecurity landscape, it’s obvious that government agencies face more than…

Ransomware and SLED – Why K-12 institutions and municipalities are juicy targets for hackers

This article originally appeared on TD Synnex’s official blog, HERE. Ransomware attacks against K-12 educational institutions have been on the rise in recent years, and the Cybersecurity and Infrastructure Security Agency (CISA) has taken notice. School networks have become juicy…

How CISA can assist federal agencies in navigating the “Wild, Wild, West” of cyber defense

Over the past decade, cybercrime has proven to be one of the greatest threats facing the American public. One can look to the unprecedented Colonial Pipeline attack as a prime example. This cyberattack led to millions of Americans being denied…

The current state of government AppSec and the threats agency developers face

For IT professionals who develop the technologies, applications, and services that federal, state, and local government agencies employ, there is one specific challenge that they always find themselves brushing up against. When government agencies request new applications and expect them…

How AppDynamics bridged the digital divide and transformed UTSA’s student service infrastructure

For young people across the state of Texas, particularly first-generation college-bound students, The University of Texas at San Antonio (UTSA) is a critical gateway to higher education and career success. With more than 34,000 students, the school is committed to…

Federal government looks to bolster cybersecurity infrastructures due to heightened security threats

This article originally appeared on the official DLT Solutions blog. The heightened threat of retaliatory cyberattacks by Russia against critical U.S. IT infrastructure is prompting federal investments in cybersecurity to strengthen its cyber defense posture. The ongoing conflict in the…

Stop Cloud Breaches with an Adversary-Focused Approach to Security

This article originally appeared on the CrowdStrike Blog and can be viewed here. It should come as no surprise that as enterprise and government IT networks moved towards the cloud and decentralized their networks, attackers updated their cyberattack methods accordingly.…