Mar

02

The transition to zero trust: How prepared are federal agencies?

Mar 02, 2022

Spurred on by the recent rise in cyber attacks on critical national infrastructure, in 2021 President Biden first set the expectation for all federal agencies to implement zero trust architecture (ZTA) within their networks. In the months following the Cyber Executive Order, federal agencies have been scrambling to meet the ambitious timeline given to them to get their zero trust strategies in place.

SHARE

Feb

11

Network segmentation is key to improving data security

Feb 11, 2022

Network segmentation is a robust security measure that is often underutilized by organizations’ network security teams. In the current threat landscape with increasingly sophisticated attacks, the successful prevention of network breaches cannot be guaranteed.

SHARE

Jan

26

The ripple effect of ransomware attacks: Kronos in chaos with millions affected

Jan 26, 2022

There is a misconception that organizations who regularly backup their systems are immune from severe damage in the event of a cyberattack. Last month’s ransomware attack on the tech giant Ultimate Kronos Group (UKG) and their Kronos software perfectly illustrates the damaging knock-on effect of ransomware.

SHARE

Jan

12

Apache Log4j vulnerability: Attack levels remain high in the new year

Jan 12, 2022

Last month a critical vulnerability in the Apache Log4j software was reported. Despite a number of patches already being released, it has been widely reported that bad actors are continuing to find new ways to exploit the Log4Shell vulnerability.

SHARE

Dec

22

Civil Fraud Initiative: Federal contractors to face penalties for non-compliance

Dec 22, 2021

The US Department of Justice (DoJ) recently announced a new initiative to pursue organizations for cybersecurity fraud using the False Claims Act (FCA). Under these plans, organizations within the federal government’s supply chain will be held accountable for misrepresenting their practices. Or not abiding by contractual commitments to monitor cybersecurity and report incidents.

SHARE

In Association With