For federal government agencies, it is not only a priority but a mandated requirement that the contractors and vendors they do business with have hardened cybersecurity compliance controls that secure their networks and protect the data and information they house.…
Rules before tools: Securing cyber and software supply chains with C-SCRM
As cyber and software supply chain threats continue to increase in volume, government agencies must take into consideration how vulnerable their supply chains are to potentially catastrophic cyber-attacks. In a recent webinar hosted by Digital Government Institute, Brian Paap,…
3 ways federal agencies can optimize and strengthen their user authentication methods
Cloud computing services and applications have surprisingly been around since the late-1990s and have slowly been adopted across federal government agencies since then. But when COVID-19 took the world by storm in 2020, this crawling pace had to change as…
The four-pronged, app migration approach federal agencies can take in Azure AD
As federal government agencies continue modernizing their operating environments through cloud adoption, it is more than likely that each agency has a multitude of different cloud applications that are being utilized at one time. Some of these applications might be…
How federal agencies can defend themselves against ransomware
Ransomware is an all-too-real threat in today’s world. Malicious cyber actors have expanded their ransomware techniques, resulting in breaches of anything from K-12 educational institutions, government agencies, and even high-profile brands like Garmin and Uber. In a recent webinar hosted…
Creating a cyber crisis management plan- 6 key priorities federal agencies should focus on
In today’s digital age, technology is rapidly advancing—making it easier for federal government agencies to better serve their constituents and assist their internal workforces in streamlining and facilitating agency workflows and processes. However, these technological leaps have created a massive…
How CISA can assist federal agencies in navigating the “Wild, Wild, West” of cyber defense
Over the past decade, cybercrime has proven to be one of the greatest threats facing the American public. One can look to the unprecedented Colonial Pipeline attack as a prime example. This cyberattack led to millions of Americans being denied…
9 insider threats that are impacting endpoint security
This article originally appeared on Quest Software’s official blog, HERE. Insider threats take several forms for federal government agencies. In a classic scenario, highly privileged contractors install spyware that exfiltrates sensitive data to them long after their project is complete.…