Top 10 Considerations When Choosing Data Modeling Tools According to Quest

As the digital transformation continues to change how business is done day to day, many organizations are searching for data modeling tools that meet their new needs. Public sector organizations and federal agencies, much like their private sector partners, must…

How Government IT Can Plan for DDoS Attacks in 2022 and Beyond

Richard Hummel, ASERT Threat Research Lead at NETSCOUT, recently joined GovCyberHub to detail some of the topline messages from the NETSCOUT Threat Intelligence Report and shared how DDoS attacks have evolved over the second half of 2021. During our conversation, he described…

The Continuing Evolution of Cybercriminal Enterprises and the Future of Cybersecurity

The latest NETSCOUT Threat Intelligence Report is here and it seems that cybercriminals were busy in the second half of 2021. From new applications of old attacks to the continuing evolution of cybercriminal enterprises, there is a lot to dive…

Bolstering Multi-Cloud Security with Identity Management

As organizations adapt to hybrid work and more and more cloud services are deployed, new service entities that collaborate and exchange data without human interaction, such as virtual machines and containers, are proliferating. The growth of these service accounts and…

With Reliable Document Management, Government IT can be Both Efficient and Secure

This article originally appeared in GovDevSecOpsHub and can be found here. Up until recently, the federal government was among the biggest consumers of paper, using it as a way to safely and securely store information without fear of prying eyes.…

Bolstering Application Security with Identity Governance

At its core, application onboarding is the use of software that can manage, and grant users access to applications as long as they have the proper permission and roles. More importantly, this puts applications under the jurisdiction of an identity…

A 360-Degree Outlook on the Cybersecurity Landscape

Cybersecurity is no longer considered a problem to be solved – it’s now a risk to be managed. Over the last decade, the cybersecurity landscape has solidified itself as a primary component of any government agency’s IT infrastructure. With today’s…

Defense-in-Depth or Zero Trust: What is the Best Strategy for your Agency?

The digital transformation has had a profound impact on the way organizations operate. Long-standing security solutions have demonstrated signs of wear against the rapid speed of innovation from cybercriminals. However, one paradigm has quickly risen to be the new standard…

Four Best Practices for Leveraging the Cloud for Data Protection

Everything is not the same for applications and data, so why treat everything the same for cloud cyber security and data protection? This question was the primary driver of a recent webinar hosted by Quest, titled Best Practices for Using…

A New Global Pandemic – Threat Intelligence Report Shows Massive Uptick in DDoS Attacks

NETSCOUT recently released its semi-annual Threat Intelligence Report with deep insights into the notably distributed denial-of-service (DDoS) and cyber activity during the second half of 2021. The report contains troves of valuable information about the ongoing threat posed to organizations…