Cybersecurity is no longer considered a problem to be solved – it’s now a risk to be managed. Over the last decade, the cybersecurity landscape has solidified itself as a primary component of any government agency’s IT infrastructure. With today’s…
City of Frisco Modernizes its Technology Landscape to Drive Collaboration
It’s not easy managing the evolving technology needs of one of the fastest-growing cities in the United States. But over the past decade, the City of Frisco, Texas, has transformed its digital approach from a disjointed set of products to…
4 Challenges Threatening Cyber Resiliency Across Government Agencies
Steve Morgan, the founder of Cybersecurity Ventures and Editor-in-Chief of Cybercrime Magazine, once estimated that a company will be hit by ransomware every 11 seconds. That estimate was published in 2019, which might as well be a decade ago in…
Five characteristics of a true XDR solution
This article is part of a larger piece that was published on the CrowdStrike blog. To read the original in its entirety, click HERE. Many of today’s government agencies rely on a collection of disparate security tools to identify and…
Choosing a Multifactor Authentication Technology
In the early days of computing, authentication was simple: If you wanted to log in to an IT system, you had to enter your username and password. If what you entered matched what the system had stored in its directory,…
Global Threat Report Shows Malicious Actors Went Big Game Hunting in 2020
Earlier this month, the global cybersecurity firm, CrowdStrike, released their 2021 Global Threat Report, which provides a detailed, in-depth picture of the current threat landscape facing organizations today, an overview of threat activity from the past year, and recommendations for…
The uphill climb of rebuilding America’s cyber workforce
President Biden has proposed injecting up to $9 billion to help bolster the Technology Modernization Fund. What should this $9 billion be used on? Where could it be most effectively utilized to secure our nation, and what is the current…
IoT, BYOD and clouds contribute to IT complexity and asset management concerns
While it may seem like decades that we’ve been talking about the security concerns of Bring Your Own Device (BYOD), cloud implementations, and now the Internet of Things (IoT), a recent eBook authored by analyst firm, Enterprise Strategy Group (ESG),…
Cyberthieves exploiting coronavirus fears spark demand for cyberwarriors
Times of crisis and uncertainty can be frightening for everyday citizens, but they’re opportunities for cyber thieves. And the ongoing coronavirus pandemic is certainly no exception. While as many as 60,000 Americans have died from COVID-19, cyber thieves have ramped…
Ransomware Observations from 2019: The Greedy Get Greedier
Global endpoint security provider CrowdStrike recently released its much-anticipated annual Global Threat Report, which details the most significant cybersecurity events and trends of the past year. The report is compiled with details and information from the CrowdStrike Intelligence team, the…