Log Management – How federal agencies can implement M-21-31 requirements

For federal agencies, monitoring for atypical IT events and having visibility across system infrastructures are critical capabilities to have when determining if cyber breaches are occurring on government networks. In 2021, the White House released memorandum M-21-31, which provided guidance…

Four Automation Targets That Can Help Overcome the Federal Cyber Workforce Shortage

Since the beginning of the COVID pandemic, cyberattacks have become increasingly frequent and sophisticated, looking to leverage a changing IT landscape that resulted as government agencies and their IT teams worked to enable the “new normal” of a distributed workforce.…

Improving Cyber Situational Awareness with Compliance Automation

Today’s federal government and military are facing workforce shortages and vacancies in many important positions. However, none of these vacancies are as potentially harmful to the security of our nation as the shortages that exist in our federal cybersecurity workforce.…

Five characteristics of a true XDR solution

This article is part of a larger piece that was published on the CrowdStrike blog. To read the original in its entirety, click HERE. Many of today’s government agencies rely on a collection of disparate security tools to identify and…

Practice makes perfect – honing incident response skills

Practice makes perfect. It’s a cliché for a reason, because it’s very true. The more you work at a particular skill or task, the better and more proficient that you become at it. Unfortunately for the cyberwarriors that are tasked…

Ten steps to avoiding ransomware

Recently, 22 different cities across the State of Texas were hacked and hit with simultaneous ransomware attacks – attacks where computer systems or data are effectively held hostage for a monetary ransom. And Texas isn’t the only victim. According to…

Five considerations when choosing a SIEM tool

While cybersecurity remains one of the top priorities for government IT personnel, there is no one single solution to guard agencies against all cyberthreats, there are tools that can certainly go a long way toward managing and understanding the cyberthreat…