Four Benefits of Adopting a Least Privilege Model

The least privilege model is something of a hot topic these days. As part of the foundation of a cybersecurity paradigm, it can provide a robust and resilient first level of defense against many comment cyberthreats. But what exactly is…

How a Zero Trust Methodology is Helping to Redefine Government IT According to DLT’s Don Maclean

Government IT teams are worried and for good reason. Confronted by the rising threat of sophisticated cyberattacks, they are looking at an uncertain future and wondering if they have the best tools to defend their systems. When defenders create new…

Government Cybersecurity 2022 Priorities from Quest’s Chris Roberts

Government cybersecurity is at a critical junction. Faced with the rising threat of cyberattacks against physical supply chains and critical infrastructure, government agencies and organizations are looking for ways to safeguard their networks while still providing citizens with the service…

Quest’s Chris Roberts Shares Four Tenets for Securing Government Networks in 2022

Experts anticipate that cybersecurity will be just as large of a challenge and a priority for government networks in 2022 as it was last year. Ultimately, as government agencies have embraced digital transformation initiatives that have fundamentally altered how they…

New Year, New Breaches—Three modern identity attacks insights to know going into 2022

The beginning of a New Year is always a strangely quiet time for government agencies. The holidays have just ended, agency employees are slowly trickling back into work and settling back into their home offices, to sign in and begin…

NETSCOUT CIO shares 4 ways the digital transformation makes organizations run more effectively and securely

The digital transformation of the IT space has been one of the few bright spots over the last year and a half. Embracing the cloud and utilizing it to facilitate work has empowered organizations like never before. It was, however,…

Dr. Andreas Weigend to give “data dilemma” keynote address at Quest EMPOWER 2021

As federal government agencies become more innovative with their data, it is critical that they have comprehensive knowledge of the latest trends, best practices, and technologies for their data systems. That is why Quest is holding its first annual Quest…

9 Steps to make cybersecurity everyone’s duty this CSAM according to CrowdStrike

As Cybersecurity Awareness month continues on, many around the industry are reviewing many of the best practices that have helped safeguard government agencies as they have adapted to modern threats. Information security professionals have had to address a number of…

Choosing a Multifactor Authentication Technology

In the early days of computing, authentication was simple: If you wanted to log in to an IT system, you had to enter your username and password. If what you entered matched what the system had stored in its directory,…

Kaseya Cyberattack: A preview of things to come?

On July 4th, 2021, a cyberattack occurred that made use of a zero-day vulnerability present in Kaseya software to gain access to a multitude of desktops. The ransomware attack demonstrated a number of new and innovative exploits that are deeply…