How Azure Government delivers emerging cloud capabilities at a classified level

When a new cybersecurity, database management, or cloud solution debuts on the commercial market, there is almost always a lengthy waiting period before the technology trickles down into the hands of federal government agencies. Due to the government’s significantly heightened…

DBAs, Data Owners, and the Security Team—Distinguishing the Key Players Who Keep SLED Data Safe

In a previous article on the GovCyberHub, we were joined by Amit Parikh, an Information Management Senior Consultant at Quest Software, who discussed the new reality facing state and local government Database Administrators (DBAs) and explained how advanced workload analytics…

How the U.S. Government Can Stop Cyber Threats Emerging from the Ukraine-Russia Conflict

This article originally appeared on the official DLT Solutions blog. Though the Ukraine-Russia conflict began when the Russian military invaded Ukraine last February, the cybersecurity and cyber warfare elements of this conflict began long before initial combat action. Ukraine was…

Microsoft’s Federal Security CTO on the impact of OMB’s zero trust strategy

Last January, the Office of Management and Budget (OMB) released M-22-09, a memorandum that set forth the federal government strategy on zero trust adoption, in an effort to reinforce the security and protection of government agencies’ critical systems, networks, and…

Why Digital Transformation is Good for Constituents, but Bad for DBAs

The day-to-day of a database administrator (DBA) working for a state, local, or municipal government or agency has changed significantly in the past few years. The digital transformation initiatives that became incredibly pervasive in the days following the start of…

5 common risks to successful cloud migration and data diversity strategies

State and local government agencies are changing fast to keep up with today’s constituent demands. A critical component to keeping pace with these demands is the adoption of new technologies, processes and solutions that are being driven by digital transformation.…

Six Strategies to Minimize Your Agency’s IT Attack Surface

Recent events around the world have demonstrated that there are countless attack vectors which cybercriminals can exploit to gain access to your network, and your data. With cyberattacks costing their victims millions of dollars, being able to prevent these malicious…

Bolstering Multi-Cloud Security with Identity Management

As organizations adapt to hybrid work and more and more cloud services are deployed, new service entities that collaborate and exchange data without human interaction, such as virtual machines and containers, are proliferating. The growth of these service accounts and…

How the U.S. Department of the Navy is Approaching Zero Trust

This article originally appeared on the DLT Solutions official blog and can be found here. The U.S. Navy and Marine Corps are grappling with the multi-headed hydra that is cybersecurity. At the Department of Navy (DON) IT Conference 2022, the…

With Reliable Document Management, Government IT can be Both Efficient and Secure

This article originally appeared in GovDevSecOpsHub and can be found here. Up until recently, the federal government was among the biggest consumers of paper, using it as a way to safely and securely store information without fear of prying eyes.…