Rules before tools: Securing cyber and software supply chains with C-SCRM

As cyber and software supply chain threats continue to increase in volume, government agencies must take into consideration how vulnerable their supply chains are to potentially catastrophic cyber-attacks.   In a recent webinar hosted by Digital Government Institute, Brian Paap,…

3 ways federal agencies can optimize and strengthen their user authentication methods

Cloud computing services and applications have surprisingly been around since the late-1990s and have slowly been adopted across federal government agencies since then. But when COVID-19 took the world by storm in 2020, this crawling pace had to change as…

The four-pronged, app migration approach federal agencies can take in Azure AD

As federal government agencies continue modernizing their operating environments through cloud adoption, it is more than likely that each agency has a multitude of different cloud applications that are being utilized at one time. Some of these applications might be…

4 ways agencies can protect themselves from cyber attacks in Microsoft directory services

As technology has evolved, so has the adoption and use of next-generation cloud platforms. Over the years, federal government agencies have adopted a multitude of cloud platforms to facilitate  more efficient workflows and to create a more secure environment for…

How federal agencies can defend themselves against ransomware

Ransomware is an all-too-real threat in today’s world. Malicious cyber actors have expanded their ransomware techniques, resulting in breaches of anything from K-12 educational institutions, government agencies, and even high-profile brands like Garmin and Uber. In a recent webinar hosted…

How CISA can assist federal agencies in navigating the “Wild, Wild, West” of cyber defense

Over the past decade, cybercrime has proven to be one of the greatest threats facing the American public. One can look to the unprecedented Colonial Pipeline attack as a prime example. This cyberattack led to millions of Americans being denied…

9 insider threats that are impacting endpoint security

This article originally appeared on Quest Software’s official blog, HERE. Insider threats take several forms for federal government agencies. In a classic scenario, highly privileged contractors install spyware that exfiltrates sensitive data to them long after their project is complete.…

Happy Holidays from the GovCybersecurityHub Team

The GovCybersecurityHub will be back with even more content in 2023. We would like to thank you for visiting us in 2022, and encourage you to come back in the New Year to see what we’ve got in store. Have a…

WVDEP CIO explains how digital transformation enhanced the state agency’s cybersecurity and boosted productivity

When COVID-19 reached American shores, state and local government agencies and educational organizations (SLED) had to abruptly and suddenly find a way to operate in a world with no face-to-face, in-person interaction. This forced many of them to turn to…