The changing role of cyber resiliency planning for government agencies

The ongoing COVID-19 pandemic forced government agencies to expedite their digital transformation initiatives and embrace new technologies in an effort to enable their workforces to operate remotely. With the potential for employees to possibly get sick or perish, agencies moved…

The three weak links in the Connectivity Supply Chain and how to protect it

At NETSCOUT, we refer to all of the technologies and services that enable companies and individuals to stay connected to the internet as the Connectivity Supply Chain. This includes services that underpin all interconnected devices—enterprise Internet of Things (IoT) devices…

Three Ways to Test Government Networks for DDoS Resiliency

This article was originally published on the NETSCOUT blog. Click HERE to read the original article in its entirety.Although distributed denial-of-service (DDoS) attacks have been around for more than 20 years, they remain something of a moving target as cybercriminals regularly discover…

Cyber Extortion Symposium – Keeping eCriminals at Bay

According to the cybersecurity firm, CrowdStrike, there were more than 40,000 cyber intrusions in just the first half of 2020 alone. What were the hackers looking to accomplish with the cyber intrusions? Since 63 percent of incidents CrowdStrike investigated in…