Active Directory Management (Part 1) – Quest’s Senior Technology Executive examines the current state of federal agencies’ AD environments

It’s hard to believe that it has been 23 years since Microsoft’s Active Directory (AD) was released. Since its debut as a part of Windows 2000 Server, AD has gone through many evolutions and iterations to become the complex platform…

How federal agencies are automating cyber compliance problem solving with their CBOM

Just as federal agencies need a software bill of materials (SBOM) in order to have a detailed breakdown of their supply chain relationships of open-source and commercial software components, government organizations also need to apply those same principles to their…

Why a CBOM is the cyber compliance solution every government agency needs

This article originally appeared on SteelCloud’s official blog, HERE. A software bill of materials (SBOM) is something everyone in the cybersecurity field knows and understands. It was even mandated by President Biden in his Executive Order on Improving Our Nation’s…

Why cloud adoption is gaining steam within SLED organizations

This article originally appeared on the TD SYNNEX blog, HERE. Cloud services continue to be a top priority for state chief information officers (CIOs), but the focus has accelerated due to the emergence of digital government and disruptions brought on by…

A CMMC 2.0 rule release is around the corner—What DIB and FSI organizations need to know about Level 2

It seems that any day now the U.S. Department of Defense (DoD) will announce its rulemaking on the Cybersecurity Maturity Model Certification (CMMC) 2.0. According to the CMMC policy Director for the Office of the Undersecretary of Defense for Acquisition…

US Navy outlines its cybersecurity pursuits at annual WEST Conference

This article originally appeared on TD SYNNEX’s official blog, HERE. The Department of Navy (DON) recently held its annual WEST Conference, this year with a strong emphasis on cybersecurity. The conference brought together key decision-makers from the Navy, Marine Corps,…

Why federal agencies must prioritize zero trust workforce training before FY24 deadline

This article originally appeared on Government Technology Insider. It’s no secret that the U.S. federal government operates in one of the world’s most threatened IT environments. When evaluating today’s federal cybersecurity landscape, it’s obvious that government agencies face more than…

Why the federal government’s lagging MFA adoption rate poses severe cyber risks to agency networks

According to Microsoft’s Vice President of Identity Security, Alex Weinert, only 25 percent of organizations today have adopted multi-factor authentication (MFA) as part of their overall cybersecurity infrastructure. That is a shining statistic when compared to 2017’s adoption rate of…

How cyber hackers are leveraging Group Policy infrastructures to penetrate federal networks

When the average federal employee logs into their workstation at the beginning of the day, it’s more than likely they are unaware of the thousands of unseen configurations and network controls that power their IT infrastructure. Some portions of the…

How the NIST Framework sets out to protect federal agencies’ AD environments

February 2021 was a moment in time where federal agencies were knee deep in modernizing their IT infrastructures to accommodate the digitized new normal of their processes, workflows, and services. But while the federal government was busy digitally transforming their…