How a Zero Trust Approach to Security Can Prepare Government IT for the Sophisticated Cyber Threats of 2022

Even though Cybersecurity Awareness Month has ended, it’s important to keep the discussion about securing government networks going year-round. While the need for cybersecurity has not necessarily changed, the ways cybercriminals operate have become far more sophisticated than ever before.…

Five ways to spot a phishing attack

Phishing has existed for almost two decades – and for very good reason. Everyone can be targeted by it. It’s still just as effective as ever. And there’s really no way for surefire way for security professionals to keep every…

Quest’s Chris Robert unpacks the 2021 cybersecurity landscape and discusses what to expect in 2022

Last month, the worldwide IT community recognized and celebrated Cybersecurity Awareness Month, a time where cyber professionals from around the globe reflected on the cybersecurity landscape from the past year and explored how to make online ecosystems more safe and…

NETSCOUT CIO shares 4 ways the digital transformation makes organizations run more effectively and securely

The digital transformation of the IT space has been one of the few bright spots over the last year and a half. Embracing the cloud and utilizing it to facilitate work has empowered organizations like never before. It was, however,…

Deborah Blyth on the Lessons Learned During Seven Years as Colorado CISO

While fighting wars is almost exclusively the responsibility of the U.S. Department of Defense, today’s state and local governments find themselves on the front lines of a battle. And, unfortunately for them, it’s a battle where they’re constantly on the…

With a zero trust framework, federal agencies can block hackers at every turn

According to Quest Software, there are two types of government agencies: those that have been breached and those that are going to be breached. Modern hackers are easily bypassing traditional network protections used by today’s federal agencies. They use tactics…

Threat Intelligence Report Shows the Bad Side of Innovation

Earlier today, NETSCOUT’s ATLAS Security Engineering and Response Team (ASERT) released their Threat Intelligence Report featuring findings from 1H 2021. The report analyzes the data generated by NETSCOUT ASERT in their work defending the networks of government agencies and large…

Fal.Con for Public Sector 2021: OMB’s CISO on where things stand since cybersecurity EO release

For cybersecurity professionals, 2021 has been a year that’s witnessed decades of fears and worries coming to fruition. The year began with panic, as IT professionals dizzyingly reeled and reacted to the massive SolarWinds and Microsoft Exchange Server breaches. In…

Safeguard your data against a ransomware attack with these ten data protection principles

Last month, it was announced that a vulnerability in a remote management and monitoring tool utilized by many managed service providers (MSPs) had been exploited to launch a massive ransomware attack that impacted not only those MSPs but possibly their…

Four key cyber considerations for a post-pandemic world

This article originally appeared on the NETSCOUT blog. Click here to read the original in its entirety. The need for organizations and government agencies to shift and evolve quickly in light of the COVID-19 pandemic resulted in large-scale change for remote access…