SteelCloud’s Brian Hajost on how federal agencies can effectively secure their software supply chains

As federal government agencies and the military continue to build upon the modernization efforts they’ve made across their workflows and services, it is critical that they carefully consider the cyber risks that each newly acquired application and piece of software…

Quest’s Chris Roberts on how federal agencies can bridge the skills gap between legacy Active Directory and Azure

It is a well-known fact that the majority of federal government agencies utilize on-premise Active Directory (AD) as the primary directory service for their IT infrastructures. But with the federal government encouraging agencies to follow aspirational federal IT initiatives like…

Quest’s Chris Roberts on the current state of federal zero trust

It has been more than two years since President Biden released his Executive Order (EO) on Improving the Nation’s Cybersecurity. Paramount to this EO was the directive for federal agencies to move towards adopting and implementing zero trust cybersecurity architectures.…

Active Directory Management (Part 1) – Quest’s Senior Technology Executive examines the current state of federal agencies’ AD environments

It’s hard to believe that it has been 23 years since Microsoft’s Active Directory (AD) was released. Since its debut as a part of Windows 2000 Server, AD has gone through many evolutions and iterations to become the complex platform…

How federal agencies are automating cyber compliance problem solving with their CBOM

Just as federal agencies need a software bill of materials (SBOM) in order to have a detailed breakdown of their supply chain relationships of open-source and commercial software components, government organizations also need to apply those same principles to their…

Why a CBOM is the cyber compliance solution every government agency needs

This article originally appeared on SteelCloud’s official blog, HERE. A software bill of materials (SBOM) is something everyone in the cybersecurity field knows and understands. It was even mandated by President Biden in his Executive Order on Improving Our Nation’s…

Why cloud adoption is gaining steam within SLED organizations

This article originally appeared on the TD SYNNEX blog, HERE. Cloud services continue to be a top priority for state chief information officers (CIOs), but the focus has accelerated due to the emergence of digital government and disruptions brought on by…

A CMMC 2.0 rule release is around the corner—What DIB and FSI organizations need to know about Level 2

It seems that any day now the U.S. Department of Defense (DoD) will announce its rulemaking on the Cybersecurity Maturity Model Certification (CMMC) 2.0. According to the CMMC policy Director for the Office of the Undersecretary of Defense for Acquisition…

US Navy outlines its cybersecurity pursuits at annual WEST Conference

This article originally appeared on TD SYNNEX’s official blog, HERE. The Department of Navy (DON) recently held its annual WEST Conference, this year with a strong emphasis on cybersecurity. The conference brought together key decision-makers from the Navy, Marine Corps,…

Why federal agencies must prioritize zero trust workforce training before FY24 deadline

This article originally appeared on Government Technology Insider. It’s no secret that the U.S. federal government operates in one of the world’s most threatened IT environments. When evaluating today’s federal cybersecurity landscape, it’s obvious that government agencies face more than…