Government Technology Insider
  • About
  • State & Local
  • Civilian
  • Defense & IC
SUBSCRIBE
No Result
View All Result
  • Acquisition
  • AI & Data
  • Cybersecurity
  • CX
  • Digital Transformation
  • Hybrid Work
    • Work Smarter
  • Public Safety
  • Resources
    • Technology Trends Shaping the Future of Government
    • World of Work
    • Your Digital Transformation Path Starts Here
    • The Frontlines of Customer Experience
    • Innovative Solutions for Connecting Agencies
    • Be Ready For What’s Next
Government Technology Insider
  • Acquisition
  • AI & Data
  • Cybersecurity
  • CX
  • Digital Transformation
  • Hybrid Work
    • Work Smarter
  • Public Safety
  • Resources
    • Technology Trends Shaping the Future of Government
    • World of Work
    • Your Digital Transformation Path Starts Here
    • The Frontlines of Customer Experience
    • Innovative Solutions for Connecting Agencies
    • Be Ready For What’s Next
No Result
View All Result
Government Technology Insider
No Result
View All Result
Home Civilian

Cyberattack Transparency Exposes Opportunities to Improve

by Kat Samiljan
September 6, 2022
in Civilian, Cybersecurity, Defense & IC, State & Local
Reading Time: 4 mins read
A A
A group of people sitting at a table, talking about security. There's a lock on the screen in front of them. All of it represents cyberattack transparency.
Share on FacebookShare on Twitter

Across the globe, advanced cyberattacks affect millions of people, schools, hospitals, and businesses each day. In fact, most organizations don’t worry about if they’ll be attacked but about when and how much damage they’ll incur. While researchers and experts continue to improve security to protect the enterprise, there’s much to learn from each new attack. Similar to how the National Transportation Safety Board scrutinizes every aircraft collision, no matter how small or large, cyberattack transparency can provide the global community with a wealth of information, leading to better cybersecurity.

Despite the prevalence of cyberattacks, organizations are still sensitive to being open on security matters. There are, however, positive models to follow. Following the discovery of a breach in December 2020, SolarWinds, for example, created a resource center as a home base to post findings and other important lessons learned. This level of openness and candidness can add accountability and ensure a heightened security posture. For SolarWinds, this model led to many security enhancements, including development of the SolarWinds Next-Generation Build System—a system which institutes three build environments to validate products and help ensure no long-lived environments are available for attackers to compromise. Other organizations have changed their current security models in response to the information shared, as well.

Matching disclosure in importance is the decision by many organizations to turn to open source for collaborating with trusted partners on security measures. Information gained from cyberattacks can be shared with others with varying levels of experience by organizations impacted by cyberattacks. At the same time, those who have yet to experience a cyberattack benefit from the perspective and experience of those who have knowledge and insight. Understanding a bad actor’s methods and staying vigilant against new threats are necessary to defend against attacks as successfully as possible. Arthur Bradway, solutions architect for SolarWinds, noted the importance of collaboration involving the public and private sectors for the good of all.

As a result of cyberattack transparency, silos are broken down, and improvements in security posture are possible. The lessons from recent attacks have led to many organizations taking to hybrid cloud observability solutions. This enhances security by giving organizations the tools to help monitor applications and data across the entire network with one platform. This holistic concept can be scaled to fit individual needs, allowing organizations to gain visibility across the entire network in an intuitive, single-pane-of-glass manner. By discussing cyberattacks honestly, organizations can continue to develop more effective security measures.

Technology presents incalculable mission-critical benefits. But, for all its benefits, it’s not without some downsides. With so many bad actors willing to exploit technology for financial or personal gain, the threat of a cyberattack is never-ending. The most efficient way to prepare for such attacks is by studying past exploits and staying on top of current activity and attack signatures. While being transparent about not only being the target of an attack but also about lessons learned seems counterintuitive, it’s a strong move promoting stronger security for all against future attacks.

Tags: Cyberattackcyberattack transparencycybersecurityHybrid Cloudsolarwinds

RELATED POSTS

secure cloud communications represented by a hand holding a cloud with various symbols representing communication things
Cybersecurity

How to Enhance and Secure Cloud Communications Between Agencies

March 30, 2023
FedRAMP is the Foundation of Trusted and Secure Government
Acquisition

FedRAMP is the Foundation of Trusted and Secure Government

March 29, 2023
Virtual Technology Briefing
AI & Data

Virtual Technology Briefing Showcases Strategies to Empower Agencies to Do More with Less

March 14, 2023

TRENDING NOW

  • Advana

    Meet Advana: How the Department of Defense Solved its Data Interoperability Challenges

    9427 shares
    Share 3771 Tweet 2357
  • Exploring the New Department of Defense Zero Trust Strategy: A Podcast with Verizon and Zscaler

    86 shares
    Share 34 Tweet 22
  • FedRAMP is the Foundation of Trusted and Secure Government

    38 shares
    Share 15 Tweet 10
  • Why the Government Needs a Cloud-Native Workforce

    21 shares
    Share 8 Tweet 5

CONNECT WITH US

Advertisement Banner Ad Advertisement Banner Ad Advertisement Banner Ad
Advertisement Banner Advertisement Banner Advertisement Banner
Advertisement Banner Advertisement Banner Advertisement Banner
Advertisement Banner Ad Advertisement Banner Ad Advertisement Banner Ad
MaaS Nebula Software Factory Banner Ad MaaS Nebula Software Factory Banner Ad MaaS Nebula Software Factory Banner Ad
Advertisement Banner Ad Advertisement Banner Ad Advertisement Banner Ad
Advertisment Banner Ad Advertisment Banner Ad Advertisment Banner Ad
Advertisement Banner Advertisement Banner Advertisement Banner
Advertisement Banner Ad Advertisement Banner Ad Advertisement Banner Ad

BECOME AN INSIDER

Get Government Technology Insider news and updates in your inbox.

Strategic Communications Group is a digital media company that helps business-to-business marketers drive customer demand through content marketing, content syndication, and lead identification.

Related Communities

Financial Technology Today
Future Healthcare Today
Modern Marketing Today
Retail Technology Insider
Today’s Modern Educator

Quick Links

  • Home
  • About
  • Contact Us

Become a Sponsor

Strategic Communications Group offers analytics, content marketing, and lead identification services. Interested?
Contact us!

© 2023 Strategic Communications Group, Inc.
Privacy Policy      |      Terms of Service

No Result
View All Result
  • Home
  • About Government Technology Insider
  • State & Local
  • Civilian
  • Defense & IC
  • Categories
    • Acquisition
    • AI & Data
    • Customer Experience
    • Cybersecurity
    • Digital Transformation
    • Hybrid Work
    • Public Safety
  • Contact Us