Spurred on by the recent rise in cyber attacks on critical national infrastructure, in 2021 President Biden first set the expectation for all federal agencies to implement zero trust architecture (ZTA) within their networks. In the months following the Cyber Executive Order, federal agencies have been scrambling to meet the ambitious timeline given to them to get their zero trust strategies in place.
Network segmentation is a robust security measure that is often underutilized by organizations’ network security teams. In the current threat landscape with increasingly sophisticated attacks, the successful prevention of network breaches cannot be guaranteed.
There is a misconception that organizations who regularly backup their systems are immune from severe damage in the event of a cyberattack. Last month’s ransomware attack on the tech giant Ultimate Kronos Group (UKG) and their Kronos software perfectly illustrates the damaging knock-on effect of ransomware.
Last month a critical vulnerability in the Apache Log4j software was reported. Despite a number of patches already being released, it has been widely reported that bad actors are continuing to find new ways to exploit the Log4Shell vulnerability.
The US Department of Justice (DoJ) recently announced a new initiative to pursue organizations for cybersecurity fraud using the False Claims Act (FCA). Under these plans, organizations within the federal government’s supply chain will be held accountable for misrepresenting their practices. Or not abiding by contractual commitments to monitor cybersecurity and report incidents.