GovCybersecurityHub Editors
54 Articles0 Comments

STIGs For Dummies

For both government organizations and their mission partners, addressing STIG compliance for RMF, FISMA, DevSecOps, FedRAMP, and now the new CMMC mandates, has always been challenging, especially when these organizations depend on tedious manual processes. Kenneth Hess, the author, funnels decades…

eMASS Automation – The Search for a Solution to Unite and Automate Security Compliance Data

eMASS, or the Enterprise Mission Assurance Support Service, was developed by the DoD, in part, as a repository that unites technical/machine data generated from endpoint scans with the human/non-technical data documented by security/IA personnel. Imagine a 1,000 workstation environment that quickly…

King County Uses Azure to Help Secure Resident Health Data

King County is Washington State’s most populous county, with more than 2.2 million residents. For the Department of Community and Human Services, ensuring that these residents have access to critical social and health services is top of mind. Hampered by…

City of Frisco Modernizes its Technology Landscape to Drive Collaboration

It’s not easy managing the evolving technology needs of one of the fastest-growing cities in the United States. But over the past decade, the City of Frisco, Texas, has transformed its digital approach from a disjointed set of products to…

4 Challenges Threatening Cyber Resiliency Across Government Agencies

Steve Morgan, the founder of Cybersecurity Ventures and Editor-in-Chief of Cybercrime Magazine, once estimated that a company will be hit by ransomware every 11 seconds. That estimate was published in 2019, which might as well be a decade ago in…

Five Characteristics of an Effective Common Cybersecurity Technology Stack

This article is part of a larger piece that was published on the NETSCOUT blog. To read the original in its entirety, click HERE. The last few years have seen several far-reaching cyberattacks against our nation’s critical infrastructure and essential…

Happy Holidays from the GovCybersecurityHub

When the calendars rolled over from 2020 to 2021, many Americans breathed a sigh of relief, anxious that a new year would spell the end of many of the large problems plaguing our country. Unfortunately, things didn’t really turn out…

Five characteristics of a true XDR solution

This article is part of a larger piece that was published on the CrowdStrike blog. To read the original in its entirety, click HERE. Many of today’s government agencies rely on a collection of disparate security tools to identify and…

GovCyberHub Podcast – Can government agencies get cyber insurance?

Large-scale cyberattacks are no longer rare in the news cycle. Your standard frontpage news is highlighting a new cyberattack seemingly every day due to the frequency and severity of the breaches of 2021. That’s because cyber threats are getting more…

GovCyberHub Podcast – What exactly IS cybersecurity insurance?

In our last GovCyberHub Podcast, we sat down with two experts from CrowdStrike – Deborah Blyth and Adam Cottini – to discuss the cyberthreat landscape facing state and local government agencies, and how the increased threat is making cybersecurity insurance…