Microsoft’s Federal Security CTO on the impact of OMB’s zero trust strategy

Last January, the Office of Management and Budget (OMB) released M-22-09, a memorandum that set forth the federal government strategy on zero trust adoption, in an effort to reinforce the security and protection of government agencies’ critical systems, networks, and…

Why Digital Transformation is Good for Constituents, but Bad for DBAs

The day-to-day of a database administrator (DBA) working for a state, local, or municipal government or agency has changed significantly in the past few years. The digital transformation initiatives that became incredibly pervasive in the days following the start of…

How DoD organizations can get a handle on zero trust

As the U.S. Department of Defense (DoD) continues to transition and adopt zero trust cybersecurity frameworks for its IT networks and infrastructure, the Department is also urging all of its disparate agencies and organizations to follow suit. But before DoD…

5 common risks to successful cloud migration and data diversity strategies

State and local government agencies are changing fast to keep up with today’s constituent demands. A critical component to keeping pace with these demands is the adoption of new technologies, processes and solutions that are being driven by digital transformation.…

Why a zero trust framework is the most effective at securing federal agency networks

As malicious cyber actors continue to improve and refine their techniques of penetrating and exploiting vulnerabilities in federal government agency networks, the single verification cybersecurity models that agencies have historically implemented are no longer capable of preventing breaches and attacks.…

4 key ways to securing federal government networks

For the federal government, truly securing its IT infrastructures, networks, and systems requires embracing modern, cybersecurity frameworks and dogmas in a big way. One security architecture that government agencies are being strongly encouraged to adopt is zero trust. Zero trust…

Six Strategies to Minimize Your Agency’s IT Attack Surface

Recent events around the world have demonstrated that there are countless attack vectors which cybercriminals can exploit to gain access to your network, and your data. With cyberattacks costing their victims millions of dollars, being able to prevent these malicious…

Bolstering Multi-Cloud Security with Identity Management

As organizations adapt to hybrid work and more and more cloud services are deployed, new service entities that collaborate and exchange data without human interaction, such as virtual machines and containers, are proliferating. The growth of these service accounts and…

With Reliable Document Management, Government IT can be Both Efficient and Secure

This article originally appeared in GovDevSecOpsHub and can be found here. Up until recently, the federal government was among the biggest consumers of paper, using it as a way to safely and securely store information without fear of prying eyes.…

Defense-in-Depth or Zero Trust: What is the Best Strategy for your Agency?

The digital transformation has had a profound impact on the way organizations operate. Long-standing security solutions have demonstrated signs of wear against the rapid speed of innovation from cybercriminals. However, one paradigm has quickly risen to be the new standard…