Tag Archives: cyber attack

SAP NS2’s Mark Testoni Urges US Firms to Use Latest Cybersecurity Platforms Amid Iran Tensions

TYSONS CORNER, VA, January 14, 2020 — SAP National Security Services CEO Mark Testoni said that government or commercial organizations that support many constituents or customers are potential targets if Iran perpetrates a cyberattack against the U.S. amid tensions between the two countries, ExecutiveBiz reported Thursday.

Read More »

FireEye’s Tom Topping: Threat Intelligence Could Help Agencies Defend Against Most Likely Attackers

Tom Topping, senior director of strategic programs at FireEye (Nasdaq: FEYE), has said threat intelligence and continuous visibility into their networks could allow agencies to focus their efforts and resources on adversaries that are most likely to attack them.

Read More »

SolarWinds’ Brandon Shopp: User Education, Cross-Team Collaboration Key to Gov’t Network Security

Brandon Shopp, vice president of product strategy for security at SolarWinds (NYSE: SWI), has said agencies should look at user education and cross-team collaboration as key elements of their strategies to protect networks from cyber attacks amid the increasing adoption of mobile devices and cloud platforms.

Read More »

CyberArk’s Kevin Jermyn: Agencies Need Programmatic Approach to Ensuring Privileged Access Security

Kevin Jermyn, regional manager of federal customer success at CyberArk (Nasdaq: CYBR), has said government agencies seeking to protect sensitive data from cyber attacks should come up with a program to control, monitor and oversee privileged access to critical assets.

Read More »

Trustwave’s Bill Rucker: Strategic Partnerships Could Help Ensure Federal Network Security

Bill Rucker, president of Trustwave Government Solutions, has said government agencies should establish strategic partnerships and identify vulnerabilities in order to protect networks and counter cyber hackers. Rucker wrote that agencies should leverage their partnerships with managed service providers to gain access to threat intelligence amid the evolving threat landscape. “The …

Read More »