David Presgraves
39 Articles0 Comments

David Presgraves is a Staff Writer for GovCybersecurityHub, in addition to several other online publications dedicated to defense, military, and federal government agency technologies.

AD migration and consolidation (Part 2)—The tools and best practices federal agencies should employ to reach their desired end-states

In our last article, the GovCyberHub sat down with Quest Software’s Chris Esler to examine the reasons why federal agencies migrate and consolidate their Active Directory (AD) environments, as well as delve into the many different benefits these processes deliver…

How federal agencies are automating cyber compliance problem solving with their CBOM

Just as federal agencies need a software bill of materials (SBOM) in order to have a detailed breakdown of their supply chain relationships of open-source and commercial software components, government organizations also need to apply those same principles to their…

AD consolidation and migration (Part 1)—What federal agencies need to plan for and consider beforehand

As federal IT continues to evolve, it is not uncommon for government agencies to reorganize how they conduct business to match the pace of advancements in technologies. Add into the mix that administrations and leadership can change every four years,…

A CMMC 2.0 rule release is around the corner—What DIB and FSI organizations need to know about Level 2

It seems that any day now the U.S. Department of Defense (DoD) will announce its rulemaking on the Cybersecurity Maturity Model Certification (CMMC) 2.0. According to the CMMC policy Director for the Office of the Undersecretary of Defense for Acquisition…

Why the federal government’s lagging MFA adoption rate poses severe cyber risks to agency networks

According to Microsoft’s Vice President of Identity Security, Alex Weinert, only 25 percent of organizations today have adopted multi-factor authentication (MFA) as part of their overall cybersecurity infrastructure. That is a shining statistic when compared to 2017’s adoption rate of…

How cyber hackers are leveraging Group Policy infrastructures to penetrate federal networks

When the average federal employee logs into their workstation at the beginning of the day, it’s more than likely they are unaware of the thousands of unseen configurations and network controls that power their IT infrastructure. Some portions of the…

How the NIST Framework sets out to protect federal agencies’ AD environments

February 2021 was a moment in time where federal agencies were knee deep in modernizing their IT infrastructures to accommodate the digitized new normal of their processes, workflows, and services. But while the federal government was busy digitally transforming their…

How CISA can assist federal agencies in navigating the “Wild, Wild, West” of cyber defense

Over the past decade, cybercrime has proven to be one of the greatest threats facing the American public. One can look to the unprecedented Colonial Pipeline attack as a prime example. This cyberattack led to millions of Americans being denied…

How federal agencies can keep up with the evolution of identity supply chains

Three years after COVID-19 forced federal agencies to crank their modernization dials to warp speed, the proliferation and adoption of new technologies, applications, and network solutions are still continuing to spread throughout the federal government. Though these technologies have completely…

WVDEP CIO explains how digital transformation enhanced the state agency’s cybersecurity and boosted productivity

When COVID-19 reached American shores, state and local government agencies and educational organizations (SLED) had to abruptly and suddenly find a way to operate in a world with no face-to-face, in-person interaction. This forced many of them to turn to…