How federal agencies can protect themselves from Active Directory attack paths

At the forefront of almost all of today’s cybersecurity discussions within federal government agencies are attack paths. But what are attack paths, and what makes Active Directory particularly vulnerable to them? And what can government agencies do to protect themselves?…

Is your government agency ready for its next tenant-to-tenant migration?

Is your federal government agency ready for its next tenant-to-tenant migration? Do you know when it is, what your deadline will be, and more importantly, if your tenant-to-tenant migration solution will be able to perform when you need it most?…

How IT modernization is the solution to every government agency need

In today’s age of digital transformation, it seems that new, groundbreaking and revolutionary technologies are emerging every day. A lot of us grew up with futuristic movies capturing the possibilities of technology and what our world could evolve into. Now,…

All Roads Lead to Federal Zero Trust

Over the last few years, the federal government has begun to embrace a zero trust approach as the new cybersecurity standard for agencies. Utilizing the latest solutions and best practices, the hope is to bolster federal cybersecurity and create a…

9 reasons why federal government agencies need identity governance and administration

This article originally appeared on One Identity by Quest’s official blog, here. While government agency networks continue to grow and increase their number of network users, access points, permissions, and privileges, their cyberattack surfaces are inevitably going to expand alongside…

The Continuing Evolution of Cybercriminal Enterprises and the Future of Cybersecurity

The latest NETSCOUT Threat Intelligence Report is here and it seems that cybercriminals were busy in the second half of 2021. From new applications of old attacks to the continuing evolution of cybercriminal enterprises, there is a lot to dive…

Bolstering Multi-Cloud Security with Identity Management

As organizations adapt to hybrid work and more and more cloud services are deployed, new service entities that collaborate and exchange data without human interaction, such as virtual machines and containers, are proliferating. The growth of these service accounts and…

Bolstering Application Security with Identity Governance

At its core, application onboarding is the use of software that can manage, and grant users access to applications as long as they have the proper permission and roles. More importantly, this puts applications under the jurisdiction of an identity…

Defense-in-Depth or Zero Trust: What is the Best Strategy for your Agency?

The digital transformation has had a profound impact on the way organizations operate. Long-standing security solutions have demonstrated signs of wear against the rapid speed of innovation from cybercriminals. However, one paradigm has quickly risen to be the new standard…

Two Ways State and Local Governments Can Use Federal Cybersecurity Funding

State Chief Information Officers (CIOs) are looking towards an uncertain future. The rising importance of hybrid work has created in equal parts tremendous opportunity and significant challenges. This upheaval has made many state and local governments prioritize creating an adequate…