How CISA can assist federal agencies in navigating the “Wild, Wild, West” of cyber defense

Over the past decade, cybercrime has proven to be one of the greatest threats facing the American public. One can look to the unprecedented Colonial Pipeline attack as a prime example. This cyberattack led to millions of Americans being denied…

How federal agencies can keep up with the evolution of identity supply chains

Three years after COVID-19 forced federal agencies to crank their modernization dials to warp speed, the proliferation and adoption of new technologies, applications, and network solutions are still continuing to spread throughout the federal government. Though these technologies have completely…

How multi-factor authentication is bolstering federal agencies’ cybersecurity postures

As threats to password security have increased in recent years, multi-factor authentication (MFA) has rapidly gained popularity as a method for increasing the assurance of authentication for federal government networks and applications. MFA is important, as it hardens the cybersecurity…

Modern strategies federal agencies can take for endpoint management and the migration to cloud

When COVID-19 reached American shores, most of the federal government agencies moved their processes and procedures online, accelerating a digital transformation that has been underway for decades. While the pandemic demonstrated the tremendous potential digital transformation presents to federal government…

How federal agencies can protect themselves from Active Directory attack paths

At the forefront of almost all of today’s cybersecurity discussions within federal government agencies are attack paths. But what are attack paths, and what makes Active Directory particularly vulnerable to them? And what can government agencies do to protect themselves?…

Is your government agency ready for its next tenant-to-tenant migration?

Is your federal government agency ready for its next tenant-to-tenant migration? Do you know when it is, what your deadline will be, and more importantly, if your tenant-to-tenant migration solution will be able to perform when you need it most?…

How IT modernization is the solution to every government agency need

In today’s age of digital transformation, it seems that new, groundbreaking and revolutionary technologies are emerging every day. A lot of us grew up with futuristic movies capturing the possibilities of technology and what our world could evolve into. Now,…

All Roads Lead to Federal Zero Trust

Over the last few years, the federal government has begun to embrace a zero trust approach as the new cybersecurity standard for agencies. Utilizing the latest solutions and best practices, the hope is to bolster federal cybersecurity and create a…

9 reasons why federal government agencies need identity governance and administration

This article originally appeared on One Identity by Quest’s official blog, here. While government agency networks continue to grow and increase their number of network users, access points, permissions, and privileges, their cyberattack surfaces are inevitably going to expand alongside…

The Continuing Evolution of Cybercriminal Enterprises and the Future of Cybersecurity

The latest NETSCOUT Threat Intelligence Report is here and it seems that cybercriminals were busy in the second half of 2021. From new applications of old attacks to the continuing evolution of cybercriminal enterprises, there is a lot to dive…