RL Blog

Topics

All Blog PostsAppSec & Supply Chain SecurityDev & DevSecOpsProducts & TechnologySecurity OperationsThreat Research

Follow us

XX / TwitterLinkedInLinkedInFacebookFacebookInstagramInstagramYouTubeYouTubeblueskyBluesky

Subscribe

Get the best of RL Blog delivered to your in-box weekly. Stay up to date on key trends, analysis and best practices across threat intelligence and software supply chain security.

ReversingLabs: The More Powerful, Cost-Effective Alternative to VirusTotalSee Why
Skip to main content
Contact UsSupportLoginBlogCommunity
reversinglabsReversingLabs: Home
Solutions
Secure Software OnboardingSecure Build & ReleaseProtect Virtual MachinesIntegrate Safe Open SourceGo Beyond the SBOM
Increase Email Threat ResilienceDetect Malware in File Shares & StorageAdvanced Malware Analysis SuiteICAP Enabled Solutions
Scalable File AnalysisHigh-Fidelity Threat IntelligenceCurated Ransomware FeedAutomate Malware Analysis Workflows
Products & Technology
Spectra Assure®Software Supply Chain SecuritySpectra DetectHigh-Speed, High-Volume, Large File AnalysisSpectra AnalyzeIn-Depth Malware Analysis & Hunting for the SOCSpectra IntelligenceAuthoritative Reputation Data & Intelligence
Spectra CoreIntegrations
Industry
Energy & UtilitiesFinanceHealthcareHigh TechPublic Sector
Partners
Become a PartnerValue-Added PartnersTechnology PartnersMarketplacesOEM Partners
Alliances
Resources
BlogContent LibraryCybersecurity GlossaryConversingLabs PodcastEvents & WebinarsLearning with ReversingLabsWeekly Insights Newsletter
Customer StoriesDemo VideosDocumentationOpenSource YARA Rules
Company
About UsLeadershipCareersSeries B Investment
EventsRL at RSAC
Press ReleasesIn the News
Pricing
Software Supply Chain SecurityMalware Analysis and Threat Hunting
Request a demo
Menu
Security OperationsSeptember 23, 2022

The pandemic turned out to be a boon for public-private cybersecurity cooperation

The shift to remote work punched holes in government networks. But it also fostered a transformation in public-private cooperation, one NSA official noted at LABScon.

paul roberts headshot black and white
Paul Roberts, Director of Content and Editorial at RLPaul Roberts
FacebookFacebookXX / TwitterLinkedInLinkedInblueskyBlueskyEmail Us
The pandemic turned out to be a boon for public-private cybersecurity cooperation

The security headaches created by the COVID pandemic are well known. A massive shift from in-office to remote work in the early months of 2020 resulted in huge dislocations for IT and security groups, extending already porous network “perimeters” to hundreds or thousands of employee home offices and VPN connections.

Sophisticated cyber adversaries piled on, exploiting remote worker connections to gain a foothold inside corporate IT environments and wreak havoc. Case in point: the May, 2021 compromise of Colonial Pipeline, which resulted in the shut down of a pipeline that supplies petroleum to the U.S. East Coast. That attack stemmed from a compromise of a “legacy virtual private network (VPN) profile” that was “not intended to be in use,” and not protected with multi-factor authentication, said Colonial Pipeline’s CEO, who testified to U.S. senators weeks after the attack became public.

Amidst all the chaos and disruption, however, the COVID-19 pandemic may have also been laying the seeds for a blossoming in the long and mostly frustrated effort to foster cooperation between private sector firms, federal agencies and the U.S. intelligence community.

On cooperation: ‘The pandemic helped’

“The pandemic helped,” said Morgan Adamski, the Chief of the Cybersecurity Collaboration Center at the National Security Agency (NSA), told attendees at LABScon, a gathering of security researchers hosted by SentinelOne in Phoenix on Thursday.

As it did in so many other areas of public and private life, COVID swept away long-standing obstacles to change. In this case: the embrace of remote meeting technology that COVID necessitated meant that cooperation and information sharing between federal agencies, intelligence community members and private sector firms “no longer revolved around big (in-person) meetings in SCIFs where nobody could share the data,” said Adamski, referring to the hardened “sensitive compartmented information facilities” that the government uses to discuss sensitive information.

Instead, conversations shifted to virtual meetings with participants connecting from home. To make it work, federal agencies and the intelligence community de-emphasized “crown jewels” to focus on shareable and actionable data that could be used by private sector firms to improve incident response.

“Operational collaboration” had been missing from public-private sector information sharing, Adamski said. With COVID raging, however, the intelligence community “came to the table” with threat intelligence that had both context and actionable and unique information for private sector firms.

Behind a CISA Alert: A Cry For Help

A case in point for the new, improved partnership between private firms and the government was the March, 2020 warning from CISA about “hackers’” efforts to compromise enterprise virtual private network (VPN) services to gain access to sensitive networks. Behind that seemingly innocuous warning was a flurry of communications and coordination between defense firms, the intelligence community, DHS and others over a spike in activity, much of it apparently originating in China, targeting defense industrial base (DIB) firms.

They came to us and said ‘We’re seeing tons of activity. Help us.

Morgan Adamski

That triggered an immediate response: data on the attempted intrusions collected by the defense contractors was correlated against the Department of Defense’s Information Network (DODIN), which was able to correlate the information with activity targeting other parts of the DOD network, yielding yet more attack indicators. CISA found additional activity in a canvas of non-DOD infrastructure. The result was a detailed picture of how the PRC was targeting VPN infrastructure for both private contractors and government agencies.

Adamski said that process has evolved over the past year, leading to an information sharing relationship that is more agile, free-flowing and actionable than what existed pre-Pandemic.

“What doesn’t work is ‘one size fits all,’ Adamski told the attendees at LabsCon — many of them cyber experts at leading private sector firms. “The NSA needs to come to you. We can’t force you into government constructs.”

There's much more work to do

Not that the federal government has solved the puzzle of how to partner with the private sector, Adamski noted that authority and capabilities are spread across the federal government. Bureaucracy is still the norm.

I know it's frustrating. We’re trying to work through how to make it less burdensome on you.

Morgan Adamski

For their part, private sector firms need to be focused in understanding what they want to accomplish via information sharing and collaboration with the government. “If you’re looking to do real time operational sharing, you need to be tapping into real time operational agencies."

The goal, she said, is to improve cooperation to the point that attacks are identified and mitigated before they can cause damage.

Keep learning

  • Get up to speed on the state of software security with RL's Software Supply Chain Security Report 2026. Plus: See the the webinar to discussing the findings.
  • Learn why binary analysis is a must-have in the Gartner® CISO Playbook for Commercial Software Supply Chain Security.
  • Take action on securing AI/ML with our report: AI Is the Supply Chain. Plus: See RL's research on nullifAI and watch how RL discovered the novel threat.
  • Get the report: Go Beyond the SBOM. Plus: See the CycloneDX xBOM webinar.

Explore RL's Spectra suite: Spectra Assure for software supply chain security, Spectra Detect for scalable file analysis, Spectra Analyze for malware analysis and threat hunting, and Spectra Intelligence for reputation data and intelligence.

Tags:Security Operations

More Blog Posts

Post-quantum security

Crypto group ushers in post-quantum security

Here’s a look at the Ethereum Foundation’s new PQC security effort — and why you need to modernize your SecOps.

Learn More about Crypto group ushers in post-quantum security
Crypto group ushers in post-quantum security
Cybercrime-as-a-service

Cybercrime-as-a-service forces a security rethink

With AI-powered tools readily available, sophisticated attacks no longer require sophisticated attackers.

Learn More about Cybercrime-as-a-service forces a security rethink
Cybercrime-as-a-service forces a security rethink
AI adoption guardrails

Why governance is key to safe AI adoption

A new CSA report stresses getting out in front of AI risk — and why it matters for SecOps.

Learn More about Why governance is key to safe AI adoption
Why governance is key to safe AI adoption
Adversarial AI rise

Adversarial AI is on the rise: What you need to know

Researchers explain that as threat actors move to AI-enabled malware in active operations, existing defenses will fail.

Learn More about Adversarial AI is on the rise: What you need to know
Adversarial AI is on the rise: What you need to know

Spectra Assure Free Trial

Get your 14-day free trial of Spectra Assure for Software Supply Chain Security

Get Free TrialMore about Spectra Assure Free Trial
Blog
Events
About Us
Webinars
In the News
Careers
Demo Videos
Cybersecurity Glossary
Contact Us
reversinglabsReversingLabs: Home
Privacy PolicyCookiesImpressum
All rights reserved ReversingLabs © 2026
XX / TwitterLinkedInLinkedInFacebookFacebookInstagramInstagramYouTubeYouTubeblueskyBlueskyRSSRSS
Back to Top