Aug 28, 2014 By Lee Vorthman In Blog

Cybersecurity: A Big Data Problem

Big data comes in all shapes and sizes and managing data always requires a secure approach. A well-executed cybersecurity program closely resembles a big data problem in the challenges it creates.  How does data volume, velocity and complexity impact the ability to do cyber? How can an agency’s infrastructure get in the way of...

Read More

Aug 27, 2014 By Scott Montgomery In Blog

McAfee’s SIEM Steps Out Smartly as a Leader for Federal and Enterprise Customers

It’s hard enough to keep pace with network demands and be able to detect threats in real time. It’s even harder to stay on top of all the information generated about those threats, intrusions and suspicious network behavior. Enter SIEM, Security Information and Event Management, which in an age of big data has become essential for quickly...

Read More

Aug 22, 2014 By Jean-Paul Bergeaux In Blog

DHS, OPM Suspend Work with Government Contractor Suffering Cyber Breach

With targeted state sponsored “sniper” [] attacks growing more common, the mass spray of unsophisticated botnets is merely a distraction in today’s cyber security war.  At SwishData, we’re focused on helping organizations defend against targeted “sniper”...

Read More

Aug 20, 2014 By Dave Ulepic In Blog

The Bucket List: Top Seven Things NetApp can do for your Cyber Security Environment

Always find the silver lining. Sometimes it is hard to find the good in situations when tough headlines cover the newspapers, reporters talk about the negative consequences ahead, and the forecast is doom and gloom. Have we reached an apocalypse where our enemies can access our networks and our data without us ever knowing about it? Maybe, but...

Read More

Aug 15, 2014 By Ken Kartsen In Blog

APT vs. AET: Knowing the Difference and Mitigating the Threat

The security world, as many specialty fields, is full of acronyms. Those of us in the business know a SIEM from an IPS from a NGFW, and we’re happy to explain the difference to customers, many of whom know exactly what we’re talking about. There’s one set of acronyms, though, that can be confusing: APTs and AETs. Advanced Persistent...

Read More

Aug 07, 2014 By Jean-Paul Bergeaux In Blog

Relief for the Overworked Cyber Warriors

The cyber warrior community is filled with lots of innovative tools to take on the bad guys. I’m sure they would admit that they have some problems. What’s your problem? I hear a lot from customers that the biggest concern is the cross-comparing threats across different tools. Double Trouble In most Security Operations Centers (SOCs), if...

Read More

Aug 05, 2014 By Sean Applegate In Blog

Q&A: Sean Applegate, Director of Technology Strategy, Riverbed Federal

Federal agencies are always looking for ways to spend their security dollars more efficiently. Cyber Attack Defenders recently sat down with Sean Applegate, Director of Technology Strategy at Riverbed Federal, who provided some tips on how agencies can boost their security capabilities while cutting costs by coordinating their investments in...

Read More

Jul 30, 2014 By Jean-Paul Bergeaux In Blog

The “WMDs” and “Snipers” of Today’s Cyber Wars

In war, there is an immense difference between the crude methods of the indiscriminate destruction of weapons of mass destruction (WMD) and that of a well-trained sniper on a well-funded, highly planned mission.  WMDs leave catastrophic chaos, and make it clear to everyone something big happened. It is more about fear than accomplishing...

Read More

Jul 17, 2014 By Jean-Paul Bergeaux In Blog

Hackers are Using Magician’s Tricks on Feds

In magic, the name of the game is miss-direction.  Magicians want you to pay attention to one hand while their other hand performs the trick. It’s aptly called, “sleight of hand.”  Cyber bad guys are doing the same thing. Joint Chiefs chairman Martin Dempsey recently said that in just a one-month period, Department of Defense networks...

Read More

Jul 15, 2014 By Steven Coles In Blog

Q&A: Steven Coles, Vice President of Networking and Security for the U.S. Public Sector at VMware

New solutions are allowing government customers to best isolate and manage security breaches and incidences. This is particularly true as federal agencies move to embrace virtualization and cloud computing for enhanced efficiencies and increased data center performance. Cyber Attack Defenders recently sat down with Steven Coles, Vice President...

Read More