Five Steps for Embracing Least Privilege in Your Organization

Recently, this publication shared four benefits of a least privilege approach to security and explained why least privilege is an important part of network security. The importance of this approach is hard to overstate but it bears repeating that as…

Four Benefits of Adopting a Least Privilege Model

The least privilege model is something of a hot topic these days. As part of the foundation of a cybersecurity paradigm, it can provide a robust and resilient first level of defense against many comment cyberthreats. But what exactly is…

Government Cybersecurity 2022 Priorities from Quest’s Chris Roberts

Government cybersecurity is at a critical junction. Faced with the rising threat of cyberattacks against physical supply chains and critical infrastructure, government agencies and organizations are looking for ways to safeguard their networks while still providing citizens with the service…

Quest’s Chris Roberts Shares Four Tenets for Securing Government Networks in 2022

Experts anticipate that cybersecurity will be just as large of a challenge and a priority for government networks in 2022 as it was last year. Ultimately, as government agencies have embraced digital transformation initiatives that have fundamentally altered how they…

3 Ways That a Whole-of-Nation IT Approach Can Challenge Ransomware Attackers in 2022

Recently the Institute for Critical Infrastructure Technology (ICIT), known for being, “the cybersecurity think tank,” released a paper titled, “Ransomware Weaponized.” Diving into the nature of modern ransomware, the organization wrote extensively on the need for a wider and more…

Quest’s Chris Robert unpacks the 2021 cybersecurity landscape and discusses what to expect in 2022

Last month, the worldwide IT community recognized and celebrated Cybersecurity Awareness Month, a time where cyber professionals from around the globe reflected on the cybersecurity landscape from the past year and explored how to make online ecosystems more safe and…

Why government agencies must move beyond firewall protection as the end-all and be-all of protection

Firewalls are a critical part of the modern cybersecurity paradigm, but they are not likely to be enough to defend against many common cyberattacks. One, in particular, DDoS attacks, present a unique challenge for firewalls, according to NETSCOUT’s Richard Hummel,…

Choosing a Multifactor Authentication Technology

In the early days of computing, authentication was simple: If you wanted to log in to an IT system, you had to enter your username and password. If what you entered matched what the system had stored in its directory,…

Why a firewall, alone, won’t protect your network from DDoS attacks

In a recent interview with the GovCyberHub, NETSCOUT’s Richard Hummel spoke about the common misconception that firewalls protect federal government agencies’ networks against DDoS cyberattacks. He explained that, “Firewalls do little to protect against a DDoS attack and are designed…

Is 2021 the year that government agencies finally focus on data privacy?

A number of recent, high-profile data breaches and cyberattacks on U.S. digital infrastructure, networks, and critical infrastructure have made data privacy top-of-mind for the federal government. In light of recent attacks, including the Solarwinds breach, the Colonial Pipeline breach, and…