tag >> gigamon
July 11th, 2017
In this time of command and control (C&C) attacks, network visibility is not only essential for optimum functioning, but critical to network security.
October 17th, 2016
When it comes to cybersecurity, agencies can make the most progress by addressing insider, as opposed to outsider, threats. In government, most insider breaches can be tied back to two things: a phishing scam or stolen credentials. Following last year’s Cyber Sprint, the federal government has been making strides to become more proactive in implementing authentication policies designed to reduce these types of attacks. Still, in today’s threat landscape--where you must assume there’s going to be some sort of breach or insider mistake--agencies must continue to evolve the attitude of preparedness, focusing on infrastructure and automation to establish an effective risk-based approach to cyber threats.
September 7th, 2016
The fundamentals of cybersecurity still rest on perimeter security, access control for the ingress and egress of data, strong authentication, and data encryption. But these strategies alone are simply not enough for government agencies to defend themselves. Today, we have to assume that a breach is inevitable and, because of that, we need to be able to respond quickly with the tools at hand.
August 1st, 2016
Government has truly entered a new era of cyber threats – from 2006 to 2014, there was a 1,121% increase in incidents concerning federal agencies. In 2015 alone, there were 50,315 incidents reported around public sector security. Continual and rising threats to our government’s cyber infrastructure have made a more coordinated response strategy to attacks an imperative. To this, many agencies have stood up some form of a Computer Security Incident Response Team (CSIRT) to more effectively respond to cyber threats and breaches. On a basic level, CSIRTs are service organizations that receive and review incident reports and then develop a coordinated response plan.
March 2nd, 2016
Today’s data center is ever-evolving and integrates with a widely interconnected and increasingly virtual IT infrastructure. Users today are innovating in their data centers with the use of applied technology. Check out these 6 ways data centers are becoming more agile and secure.
February 26th, 2015
Big Data continues to dominate headlines and lead the list of "buzziest" words, but all this attention is not misplaced.
- Arista, Big Data, Cloudera, EMC, ExtraHop, Gigamon, Government Big Data Forum, Haystax, HP, HPE, Internet of Things, Paxata, Splunk, Tableau