GovCybersecurityHub Editors
99 Articles0 Comments

US Navy outlines its cybersecurity pursuits at annual WEST Conference

This article originally appeared on TD SYNNEX’s official blog, HERE. The Department of Navy (DON) recently held its annual WEST Conference, this year with a strong emphasis on cybersecurity. The conference brought together key decision-makers from the Navy, Marine Corps,…

Why federal agencies must prioritize zero trust workforce training before FY24 deadline

This article originally appeared on Government Technology Insider. It’s no secret that the U.S. federal government operates in one of the world’s most threatened IT environments. When evaluating today’s federal cybersecurity landscape, it’s obvious that government agencies face more than…

12 Privileged Access Management best practices for federal agencies

No matter what risks a federal government agency is facing, you can draw a threat vector from that risk to a privileged account. Privileged accounts are the backbone of any operating agency, so it’s vital that these accounts are protected…

What federal agencies need to know about continuous data protection

Continuous data protection has emerged as a form of data protection for federal government agencies that picks up where legacy backup approaches leave off. For decades, the standard of care in protecting federal data has been to run full scheduled…

How federal government agencies can get the most out of their MFA implementation

Authentication is the new entry point into federal government networks. Most federal users know this, and more importantly, attackers know this as well. Federal agencies can no longer recommend changing passwords on a periodic basis and consider that an adequate…

9 insider threats that are impacting endpoint security

This article originally appeared on Quest Software’s official blog, HERE. Insider threats take several forms for federal government agencies. In a classic scenario, highly privileged contractors install spyware that exfiltrates sensitive data to them long after their project is complete.…

Happy Holidays from the GovCybersecurityHub Team

The GovCybersecurityHub will be back with even more content in 2023. We would like to thank you for visiting us in 2022, and encourage you to come back in the New Year to see what we’ve got in store. Have a…

How the U.S. Air Force is prioritizing interoperability, cybersecurity, and resiliency

A top priority for the Department of the Air Force (AF) (which includes both the Air Force and Space Force) is enhancing its access, partnership and integration capabilities across IT systems, but also other parts of government. The department’s vision…

12 data governance tips that every federal agency should keep in mind

Data governance best practices ensure that your federal agency’s data is being created, collected, stored, and accessed by the right people for the right purpose. Which processes have you put in place to manage access, availability, usability, quality and security?…

How federal government agencies can navigate the challenges of cloud data warehouse adoption

This article originally appeared on Quest Software’s official blog. As federal government agencies prioritize their digital transformation goals, two trends in modernization, namely the hybrid cloud and the “cloud data warehouse,” have converged presenting a real opportunity to move the…