Presidio Federal and IBM recently partnered up and collaborated with GovCIO to dive deep into how the U.S. Department of Defense (DoD) is exploring their opportunities with the use of artificial intelligence (AI). AI can assist the DoD in not…
The principle of least privilege—How federal agencies leverage POLP to protect and secure their IT systems
This article originally appeared on Quest Software’s official blog, HERE. It may come as a surprise that for many years the concept of least privilege was foreign in a Windows network. It would not have been uncommon in the past…
Quest Public Sector on the 5 cybersecurity benefits tiered administration delivers to the federal government
While operating within an ever evolving and complex cybersecurity landscape, federal agencies face difficult decisions around what to prioritize for protection and recovery in the face of advanced security threats. There are a few things that can be done to…
7 ways the federal government can overcome cloud migration challenges
This article originally appeared on Quest Software’s official blog, HERE. Cloud migration challenges — capacity, throughput, performance and above all security — confront everyone in federal government agencies from leaders and managers to users. Digital transformation has been well documented…
How automating CIS compliance strengthens federal data security
This article originally appeared on SteelCloud’s official blog, HERE. As malicious cyber actors’ methods and tactics continue to increase in sophistication and effectiveness, having your company achieve certain cybersecurity compliance standards has become more important than ever. It protects your…
Discover how the U.S. Space Force, Presidio Federal, IBM, and TD SYNNEX came together to modernize space surveillance systems (Case Study)
For five years, the U.S. Space Force (USSF) had been using the same IBM processors to support its space surveillance missions. The technology was nearing the end of life and was not upgradable to support the U.S. Air Force Multi-Cloud…
Strengthening federal software supply chains through the power of automation
This article originally appeared on SteelCloud’s official blog, HERE. When you mix all the Executive Orders, NIST standards, SBOMs, CUI, and critical software together, your organization will have a more secure supply chain. But it’s all just a mishmash of…
Why a CBOM is the cyber compliance solution every government agency needs
This article originally appeared on SteelCloud’s official blog, HERE. A software bill of materials (SBOM) is something everyone in the cybersecurity field knows and understands. It was even mandated by President Biden in his Executive Order on Improving Our Nation’s…
US Navy outlines its cybersecurity pursuits at annual WEST Conference
This article originally appeared on TD SYNNEX’s official blog, HERE. The Department of Navy (DON) recently held its annual WEST Conference, this year with a strong emphasis on cybersecurity. The conference brought together key decision-makers from the Navy, Marine Corps,…
Why federal agencies must prioritize zero trust workforce training before FY24 deadline
This article originally appeared on Government Technology Insider. It’s no secret that the U.S. federal government operates in one of the world’s most threatened IT environments. When evaluating today’s federal cybersecurity landscape, it’s obvious that government agencies face more than…