How CISA can assist federal agencies in navigating the “Wild, Wild, West” of cyber defense

Over the past decade, cybercrime has proven to be one of the greatest threats facing the American public. One can look to the unprecedented Colonial Pipeline attack as a prime example. This cyberattack led to millions of Americans being denied…

9 insider threats that are impacting endpoint security

This article originally appeared on Quest Software’s official blog, HERE. Insider threats take several forms for federal government agencies. In a classic scenario, highly privileged contractors install spyware that exfiltrates sensitive data to them long after their project is complete.…

Happy Holidays from the GovCybersecurityHub Team

The GovCybersecurityHub will be back with even more content in 2023. We would like to thank you for visiting us in 2022, and encourage you to come back in the New Year to see what we’ve got in store. Have a…

WVDEP CIO explains how digital transformation enhanced the state agency’s cybersecurity and boosted productivity

When COVID-19 reached American shores, state and local government agencies and educational organizations (SLED) had to abruptly and suddenly find a way to operate in a world with no face-to-face, in-person interaction. This forced many of them to turn to…

The current state of government AppSec and the threats agency developers face

For IT professionals who develop the technologies, applications, and services that federal, state, and local government agencies employ, there is one specific challenge that they always find themselves brushing up against. When government agencies request new applications and expect them…

5 ways federal government agencies can reduce risk from attack vectors

A data breach can be a catastrophic event for any federal government agency. One way to help curb potential exploits is to get a handle on potential attack vectors. An attack vector is the combination of a bad actor’s intentions…

3 ways SAP monitoring solutions are boosting mission success for government agencies

For most government agencies, SAP® applications are mission critical. Yet, SAP performance management is still notoriously complicated and unreliable. That’s why it’s critical for agencies’ IT teams to prioritize the monitoring of the SAP landscape with solutions that will not…

Cisco AppDynamics Executive CTO explains how application performance optimization is advancing federal agencies’ mission goals

When COVID-19 reached American shores, federal government agencies were forced to quickly redefine their operating environments by adopting new, modernized processes and applications that would enable them to adjust to the new normal spurred by the pandemic. As the dust…

How federal and SLED agencies are bolstering their cybersecurity postures with DevSecOps

As the federal government and SLED organizations continue to digitally transform their systems, networks, and applications, it is critical that they remain vigilant and be aware of the fact that modernization will always be accompanied by potential network vulnerabilities and…

What federal government security architects need to know about zero trust

For the federal government, a zero trust architecture assumes that all traffic on an agency’s internal network is potentially malicious. Consequently, it requires taking measures to: Authenticate all connections Identify all devices, users, applications, and services Ensure that traffic goes…