3 ways federal agencies can optimize and strengthen their user authentication methods

Cloud computing services and applications have surprisingly been around since the late-1990s and have slowly been adopted across federal government agencies since then. But when COVID-19 took the world by storm in 2020, this crawling pace had to change as…

What federal government security architects need to know about zero trust

For the federal government, a zero trust architecture assumes that all traffic on an agency’s internal network is potentially malicious. Consequently, it requires taking measures to: Authenticate all connections Identify all devices, users, applications, and services Ensure that traffic goes…

Quest’s Chris Robert unpacks the 2021 cybersecurity landscape and discusses what to expect in 2022

Last month, the worldwide IT community recognized and celebrated Cybersecurity Awareness Month, a time where cyber professionals from around the globe reflected on the cybersecurity landscape from the past year and explored how to make online ecosystems more safe and…