Happy Holidays from the GovCybersecurityHub Team

The GovCybersecurityHub will be back with even more content in 2023. We would like to thank you for visiting us in 2022, and encourage you to come back in the New Year to see what we’ve got in store. Have a…

WVDEP CIO explains how digital transformation enhanced the state agency’s cybersecurity and boosted productivity

When COVID-19 reached American shores, state and local government agencies and educational organizations (SLED) had to abruptly and suddenly find a way to operate in a world with no face-to-face, in-person interaction. This forced many of them to turn to…

The current state of government AppSec and the threats agency developers face

For IT professionals who develop the technologies, applications, and services that federal, state, and local government agencies employ, there is one specific challenge that they always find themselves brushing up against. When government agencies request new applications and expect them…

5 ways federal government agencies can reduce risk from attack vectors

A data breach can be a catastrophic event for any federal government agency. One way to help curb potential exploits is to get a handle on potential attack vectors. An attack vector is the combination of a bad actor’s intentions…

3 ways SAP monitoring solutions are boosting mission success for government agencies

For most government agencies, SAP® applications are mission critical. Yet, SAP performance management is still notoriously complicated and unreliable. That’s why it’s critical for agencies’ IT teams to prioritize the monitoring of the SAP landscape with solutions that will not…

Cisco AppDynamics Executive CTO explains how application performance optimization is advancing federal agencies’ mission goals

When COVID-19 reached American shores, federal government agencies were forced to quickly redefine their operating environments by adopting new, modernized processes and applications that would enable them to adjust to the new normal spurred by the pandemic. As the dust…

How federal and SLED agencies are bolstering their cybersecurity postures with DevSecOps

As the federal government and SLED organizations continue to digitally transform their systems, networks, and applications, it is critical that they remain vigilant and be aware of the fact that modernization will always be accompanied by potential network vulnerabilities and…

What federal government security architects need to know about zero trust

For the federal government, a zero trust architecture assumes that all traffic on an agency’s internal network is potentially malicious. Consequently, it requires taking measures to: Authenticate all connections Identify all devices, users, applications, and services Ensure that traffic goes…

7 best practices for approaching patch management within government agencies

This article originally appeared on Quest Software’s official blog. Let’s face it, all software eventually has vulnerabilities, it always has and always will. No matter how good developers are at writing software, there will inevitably be mistakes, and there will…

Ransomware Resilience and Disaster Recovery – 4 Actions Government Agencies Can Execute Today

Ransomware has been a prominent threat to government agencies, enterprises, and individuals alike since the mid-2000s. In 2017, the FBI’s Internet Crime Complaint Center (IC3) received 1,783 ransomware complaints that cost victims over $2.3 million. Those complaints, however, represent only the…