GovCybersecurityHub Editors
99 Articles0 Comments

How federal government agencies can responsibly deploy generative AI

This article originally appeared on IBM’s official blog. Digital transformation within federal government agencies is currently being driven by data and artificial intelligence (AI). AI plays a pivotal role in unlocking value from data and gaining deeper insights into the…

IBM and Presidio Federal share 4 ways artificial intelligence is reshaping federal cybersecurity

This article originally appeared on Presidio Federal’s website and can be found HERE. Artificial intelligence (AI) can change the way government agencies operate by providing the visibility and advanced analytics to improve workflows, optimize cybersecurity practices and enable leaders to…

How the U.S. Department of Defense is Exploring AI

Presidio Federal and IBM recently partnered up and collaborated with GovCIO to dive deep into how the U.S. Department of Defense (DoD) is exploring their opportunities with the use of artificial intelligence (AI). AI can assist the DoD in not…

The principle of least privilege—How federal agencies leverage POLP to protect and secure their IT systems

This article originally appeared on Quest Software’s official blog, HERE. It may come as a surprise that for many years the concept of least privilege was foreign in a Windows network. It would not have been uncommon in the past…

Quest Public Sector on the 5 cybersecurity benefits tiered administration delivers to the federal government

While operating within an ever evolving and complex cybersecurity landscape, federal agencies face difficult decisions around what to prioritize for protection and recovery in the face of advanced security threats. There are a few things that can be done to…

7 ways the federal government can overcome cloud migration challenges

This article originally appeared on Quest Software’s official blog, HERE. Cloud migration challenges — capacity, throughput, performance and above all security — confront everyone in federal government agencies from leaders and managers to users. Digital transformation has been well documented…

How automating CIS compliance strengthens federal data security

This article originally appeared on SteelCloud’s official blog, HERE. As malicious cyber actors’ methods and tactics continue to increase in sophistication and effectiveness, having your company achieve certain cybersecurity compliance standards has become more important than ever. It protects your…

Discover how the U.S. Space Force, Presidio Federal, IBM, and TD SYNNEX came together to modernize space surveillance systems (Case Study)

For five years, the U.S. Space Force (USSF) had been using the same IBM processors to support its space surveillance missions. The technology was nearing the end of life and was not upgradable to support the U.S. Air Force Multi-Cloud…

Strengthening federal software supply chains through the power of automation

This article originally appeared on SteelCloud’s official blog, HERE. When you mix all the Executive Orders, NIST standards, SBOMs, CUI, and critical software together, your organization will have a more secure supply chain. But it’s all just a mishmash of…

Why a CBOM is the cyber compliance solution every government agency needs

This article originally appeared on SteelCloud’s official blog, HERE. A software bill of materials (SBOM) is something everyone in the cybersecurity field knows and understands. It was even mandated by President Biden in his Executive Order on Improving Our Nation’s…