As federal government agencies are increasingly under pressure to back up and recover data quickly, accurately and within budget, data growth in the cloud continues to make backup and recovery increasingly complex. Backing up all your data is a challenge…
5 ways federal government agencies can reduce risk from attack vectors
A data breach can be a catastrophic event for any federal government agency. One way to help curb potential exploits is to get a handle on potential attack vectors. An attack vector is the combination of a bad actor’s intentions…
What federal government security architects need to know about zero trust
For the federal government, a zero trust architecture assumes that all traffic on an agency’s internal network is potentially malicious. Consequently, it requires taking measures to: Authenticate all connections Identify all devices, users, applications, and services Ensure that traffic goes…
7 best practices for approaching patch management within government agencies
This article originally appeared on Quest Software’s official blog. Let’s face it, all software eventually has vulnerabilities, it always has and always will. No matter how good developers are at writing software, there will inevitably be mistakes, and there will…
7 endpoint security best practices for federal government agencies
This article originally appeared on Quest Software’s official blog. Endpoints are always the entry point for data breaches. Given the impact a breach can have on federal government agencies, applying best practices for endpoint security is of paramount importance. The…
How SLED organizations benefit from centralized monitoring of cross-platform databases
This article originally appeared on Quest Software’s official blog. Far too often, SLED organizations look at monitoring solutions as “nice to have,” or better put, as luxury items that make the lives of IT administrators easier, but come at a…
The Environmental Protection Agency and its Zero Trust Journey
This article originally appeared on DLT Solutions’ official blog, “Technically Speaking.” In a recent webinar produced by Federal News Network, the Director of the Environmental Protection Agency (EPA)’s Office of Information Security and Privacy, Tonya Manning, detailed the state of…
How federal agencies can protect themselves from Active Directory attack paths
At the forefront of almost all of today’s cybersecurity discussions within federal government agencies are attack paths. But what are attack paths, and what makes Active Directory particularly vulnerable to them? And what can government agencies do to protect themselves?…
How the Defense Industrial Base Can Prepare for CMMC Level 2+
The Defense Industrial Base (DIB), – the organizations that make up the U.S. Department of Defense’s (DoD) supply chain, is massive – comprised of hundreds of thousands of government contractors. With these organizations providing essential products, tools, and applications to…