Six Strategies to Minimize Your Agency’s IT Attack Surface

Recent events around the world have demonstrated that there are countless attack vectors which cybercriminals can exploit to gain access to your network, and your data. With cyberattacks costing their victims millions of dollars, being able to prevent these malicious…

How the U.S. Department of the Navy is Approaching Zero Trust

This article originally appeared on the DLT Solutions official blog and can be found here. The U.S. Navy and Marine Corps are grappling with the multi-headed hydra that is cybersecurity. At the Department of Navy (DON) IT Conference 2022, the…

Bolstering Application Security with Identity Governance

At its core, application onboarding is the use of software that can manage, and grant users access to applications as long as they have the proper permission and roles. More importantly, this puts applications under the jurisdiction of an identity…

Defense-in-Depth or Zero Trust: What is the Best Strategy for your Agency?

The digital transformation has had a profound impact on the way organizations operate. Long-standing security solutions have demonstrated signs of wear against the rapid speed of innovation from cybercriminals. However, one paradigm has quickly risen to be the new standard…

Three DDoS Lessons Learned from the 2H 2021 Threat Intel Report

NETSCOUT recently released the latest installment of its Threat Intelligence Report, which features the insights and information extrapolated from the data generated by NETSCOUT ASERT in their work defending the networks of government agencies and large enterprises from DDoS atatcks.…

Five Steps for Embracing Least Privilege in Your Organization

Recently, this publication shared four benefits of a least privilege approach to security and explained why least privilege is an important part of network security. The importance of this approach is hard to overstate but it bears repeating that as…

Four Benefits of Adopting a Least Privilege Model

The least privilege model is something of a hot topic these days. As part of the foundation of a cybersecurity paradigm, it can provide a robust and resilient first level of defense against many comment cyberthreats. But what exactly is…

Government Cybersecurity 2022 Priorities from Quest’s Chris Roberts

Government cybersecurity is at a critical junction. Faced with the rising threat of cyberattacks against physical supply chains and critical infrastructure, government agencies and organizations are looking for ways to safeguard their networks while still providing citizens with the service…

Quest’s Chris Roberts Shares Four Tenets for Securing Government Networks in 2022

Experts anticipate that cybersecurity will be just as large of a challenge and a priority for government networks in 2022 as it was last year. Ultimately, as government agencies have embraced digital transformation initiatives that have fundamentally altered how they…

3 Ways That a Whole-of-Nation IT Approach Can Challenge Ransomware Attackers in 2022

Recently the Institute for Critical Infrastructure Technology (ICIT), known for being, “the cybersecurity think tank,” released a paper titled, “Ransomware Weaponized.” Diving into the nature of modern ransomware, the organization wrote extensively on the need for a wider and more…