WIZARD SPIDER unleashes Conti ransomware to extort millions

Threat actors continue to find new ways of disrupting life for their own financial gain. And sometimes their new ways are modifications of previously effective malware or ransomware, usually with an added punch. In the last year, the damaging Ryuk…

Leveraging AI and ML to fight back against government cyber threats

This article was contributed by Carolyn Duby, the Solutions Architect and Cyber Security Lead at Cloudera.Gartner anticipates an estimated 300 percent growth in connected devices by 2020 sparked by faster 5G networks bringing an explosion of inexpensive, connected devices. While this…

2020 Asset Management Trends: As IT Complexity Increases, Visibility Plummets

IT infrastructure barely resembles what it looked like just 5 years ago: More than 50 percent of all VMs now reside in the cloud Employees turn to an average of four devices to conduct work IoT devices will exceed all…

Securing school networks in the age of COVID-19

We are in the midst of a dramatic global cultural change due to the COVID-19 pandemic. Online education and remote work environments that were once flexible options are now becoming the new normal — and demand is only increasing. Due…

Polymorphic defense – making your systems “moving targets”

In my recent article on the GovCybersecurityHub entitled, “Solid foundations + innovation = stout cybersecurity,” I talked about cybersecurity can be somewhat unfair. That’s because the economies of scale favor our adversaries. I also talked about the importance of security…

Zero Trust: Buzzword or hack-buster?

Trust but verify: a Russian proverb Ronald Reagan often used to characterize U.S.-Russia relations, especially regarding nuclear weapons. The Internet has made it clear that the “trust” part of the proverb may not work so well. Today, we may have…

The insider threat – the vulnerability that’s coming from inside the house

The insider threat: it’s one of the biggest and most persistent issues in cybersecurity. There have been multiple, recent high-profile cases – Manning, Snowden, and others. And these cases have both kept the issue in the public eye and kept…

Zero Trust: Buzzword or hack-buster?

Trust but verify: a Russian proverb Ronald Reagan often used to characterize U.S.-Russia relations, especially regarding nuclear weapons. The Internet has made it clear that the “trust” part of the proverb may not work so well. Today, we may have…

Polymorphic defense – making your systems “moving targets”

In my recent article on the GovCybersecurityHub entitled, “Solid foundations + innovation = stout cybersecurity,” I talked about cybersecurity can be somewhat unfair. That’s because the economies of scale favor our adversaries. I also talked about the importance of security…

Ten steps to avoiding ransomware

Recently, 22 different cities across the State of Texas were hacked and hit with simultaneous ransomware attacks – attacks where computer systems or data are effectively held hostage for a monetary ransom. And Texas isn’t the only victim. According to…