With a zero trust framework, federal agencies can block hackers at every turn

According to Quest Software, there are two types of government agencies: those that have been breached and those that are going to be breached. Modern hackers are easily bypassing traditional network protections used by today’s federal agencies. They use tactics…

Threat Intelligence Report Shows the Bad Side of Innovation

Earlier today, NETSCOUT’s ATLAS Security Engineering and Response Team (ASERT) released their Threat Intelligence Report featuring findings from 1H 2021. The report analyzes the data generated by NETSCOUT ASERT in their work defending the networks of government agencies and large…

Fal.Con for Public Sector 2021: OMB’s CISO on where things stand since cybersecurity EO release

For cybersecurity professionals, 2021 has been a year that’s witnessed decades of fears and worries coming to fruition. The year began with panic, as IT professionals dizzyingly reeled and reacted to the massive SolarWinds and Microsoft Exchange Server breaches. In…

Safeguard your data against a ransomware attack with these ten data protection principles

Last month, it was announced that a vulnerability in a remote management and monitoring tool utilized by many managed service providers (MSPs) had been exploited to launch a massive ransomware attack that impacted not only those MSPs but possibly their…

Four key cyber considerations for a post-pandemic world

This article originally appeared on the NETSCOUT blog. Click here to read the original in its entirety. The need for organizations and government agencies to shift and evolve quickly in light of the COVID-19 pandemic resulted in large-scale change for remote access…

Biden’s Cybersecurity Executive Order Should Worry Hackers

The risks that cyber threats pose to American critical infrastructures, supply chains, and government networks have been forewarned by cybersecurity experts for nearly two decades. On May 7, 2021, hackers from Eastern Europe leveraged a ransomware attack against the Colonial…

Four steps for avoiding the dreaded triple cyberextortion attack

This article was originally featured on the NETSCOUT blog. To read the original piece in its entirety, click HERE. Today’s more sophisticated malicious actors are constantly working to innovate and make their cyberattacks more effective. Recently, this has resulted in…

The Colonial Pipeline Hack: It’s Real, It Will Happen Again, and We Must Be Prepared

Hackers recently attacked computer systems belonging to the Colonial Pipeline company, forcing them to shut down operations and inhibiting delivery of diesel fuel, gasoline, and jet fuel throughout the East Coast of the United States.  This pipeline is not just…

2020 broke DDoS attack records and 2021 is on track to break even more

Last year, the COVID-19 pandemic forced federal government agencies and military organizations to fundamentally shift how they operate. As the COVID-19 pandemic reached our shores and began spreading, federal civilian and military organizations were forced to rush to embrace VPNs,…

The Million Dollar Ransomware Question – Should We Pay?

This article was originally published on the NETSCOUT blog. To read the original in its entirety, click HERE. Ransomware attacks are on the rise. According to one recent industry report, a company will be attacked every 11 seconds in 2021, and the costs…