GovCybersecurityHub Editors
79 Articles0 Comments

How SLED organizations benefit from centralized monitoring of cross-platform databases

This article originally appeared on Quest Software’s official blog. Far too often, SLED organizations look at monitoring solutions as “nice to have,” or better put, as luxury items that make the lives of IT administrators easier, but come at a…

The Environmental Protection Agency and its Zero Trust Journey

This article originally appeared on DLT Solutions’ official blog, “Technically Speaking.”  In a recent webinar produced by Federal News Network, the Director of the Environmental Protection Agency (EPA)’s Office of Information Security and Privacy, Tonya Manning, detailed the state of…

How federal agencies can protect themselves from Active Directory attack paths

At the forefront of almost all of today’s cybersecurity discussions within federal government agencies are attack paths. But what are attack paths, and what makes Active Directory particularly vulnerable to them? And what can government agencies do to protect themselves?…

Why do federal government agencies need data democratization?

When looking for an explanation of data democratization, you will most certainly find a few common themes, such as how it makes digital information accessible to the average user and gives people the tools to understand and make quick decisions.…

4 ways federal government agencies are benefitting from application performance optimization

As the waves of digital transformation continue to spread across and reach all corners of the federal government, agencies are hard at work modernizing their systems, networks, and applications, as well as their critical constituent-facing solutions and services. And as…

How AppDynamics bridged the digital divide and transformed UTSA’s student service infrastructure

For young people across the state of Texas, particularly first-generation college-bound students, The University of Texas at San Antonio (UTSA) is a critical gateway to higher education and career success. With more than 34,000 students, the school is committed to…

The Early Bird Gets the Worm, When It Comes to CMMC and the DIB

This article originally appeared on SteelCloud’s official blog site. The Department of Defense’s CMMC (Cybersecurity Maturity Model Certification) program has undergone multiple changes, revisions, updates, and organizational shifts over the last two and a half years. As a result, DoD…

UTSA Becomes a Beacon of Digital Access

The University of Texas at San Antonio is a Tier One research university and a Hispanic Serving Institution specializing in cyber, health, fundamental futures, and social-economic transformation. With more than 34,000 students, it is the largest university in the San…

Optimize Application Performance for Federal Mission Success

Fill out the form below to learn how Cisco AppDynamics helps government agencies proactively manage and optimize application performance in real-time and provides full-stack observability with mission context to advance critical agency objectives. In this Solution Brief, you’re learn how…

Federal government looks to bolster cybersecurity infrastructures due to heightened security threats

This article originally appeared on the official DLT Solutions blog. The heightened threat of retaliatory cyberattacks by Russia against critical U.S. IT infrastructure is prompting federal investments in cybersecurity to strengthen its cyber defense posture. The ongoing conflict in the…