How federal government agencies can responsibly deploy generative AI

This article originally appeared on IBM’s official blog. Digital transformation within federal government agencies is currently being driven by data and artificial intelligence (AI). AI plays a pivotal role in unlocking value from data and gaining deeper insights into the…

Quest’s Chris Roberts on the current state of federal zero trust

It has been more than two years since President Biden released his Executive Order (EO) on Improving the Nation’s Cybersecurity. Paramount to this EO was the directive for federal agencies to move towards adopting and implementing zero trust cybersecurity architectures.…

Active Directory Management (Part 2) – How automated and enhanced AD management tools sharpen federal cybersecurity

In our last article, the GovCyberHub sat down with Eric Weiss, Sr. Technology Executive at Quest Software Public Sector, Inc., to examine the current state of federal agencies’ Active Directory environments. This week, Eric returns to take a deep dive…

Active Directory Management (Part 1) – Quest’s Senior Technology Executive examines the current state of federal agencies’ AD environments

It’s hard to believe that it has been 23 years since Microsoft’s Active Directory (AD) was released. Since its debut as a part of Windows 2000 Server, AD has gone through many evolutions and iterations to become the complex platform…

How cyber hackers are leveraging Group Policy infrastructures to penetrate federal networks

When the average federal employee logs into their workstation at the beginning of the day, it’s more than likely they are unaware of the thousands of unseen configurations and network controls that power their IT infrastructure. Some portions of the…

How the NIST Framework sets out to protect federal agencies’ AD environments

February 2021 was a moment in time where federal agencies were knee deep in modernizing their IT infrastructures to accommodate the digitized new normal of their processes, workflows, and services. But while the federal government was busy digitally transforming their…

Ransomware and SLED – Why K-12 institutions and municipalities are juicy targets for hackers

This article originally appeared on TD Synnex’s official blog, HERE. Ransomware attacks against K-12 educational institutions have been on the rise in recent years, and the Cybersecurity and Infrastructure Security Agency (CISA) has taken notice. School networks have become juicy…

What federal agencies need to know about continuous data protection

Continuous data protection has emerged as a form of data protection for federal government agencies that picks up where legacy backup approaches leave off. For decades, the standard of care in protecting federal data has been to run full scheduled…

How CISA can assist federal agencies in navigating the “Wild, Wild, West” of cyber defense

Over the past decade, cybercrime has proven to be one of the greatest threats facing the American public. One can look to the unprecedented Colonial Pipeline attack as a prime example. This cyberattack led to millions of Americans being denied…