SteelCloud’s Brian Hajost on how federal agencies can effectively secure their software supply chains

As federal government agencies and the military continue to build upon the modernization efforts they’ve made across their workflows and services, it is critical that they carefully consider the cyber risks that each newly acquired application and piece of software…

How the NIST Framework sets out to protect federal agencies’ AD environments

February 2021 was a moment in time where federal agencies were knee deep in modernizing their IT infrastructures to accommodate the digitized new normal of their processes, workflows, and services. But while the federal government was busy digitally transforming their…

How federal government agencies can get the most out of their MFA implementation

Authentication is the new entry point into federal government networks. Most federal users know this, and more importantly, attackers know this as well. Federal agencies can no longer recommend changing passwords on a periodic basis and consider that an adequate…

How CISA can assist federal agencies in navigating the “Wild, Wild, West” of cyber defense

Over the past decade, cybercrime has proven to be one of the greatest threats facing the American public. One can look to the unprecedented Colonial Pipeline attack as a prime example. This cyberattack led to millions of Americans being denied…

What federal government security architects need to know about zero trust

For the federal government, a zero trust architecture assumes that all traffic on an agency’s internal network is potentially malicious. Consequently, it requires taking measures to: Authenticate all connections Identify all devices, users, applications, and services Ensure that traffic goes…

Federal government looks to bolster cybersecurity infrastructures due to heightened security threats

This article originally appeared on the official DLT Solutions blog. The heightened threat of retaliatory cyberattacks by Russia against critical U.S. IT infrastructure is prompting federal investments in cybersecurity to strengthen its cyber defense posture. The ongoing conflict in the…

CISA NRMC AD shares five steps for getting our nation’s cyber risk under control

Recently, CrowdStrike held its annual Fal.Con for Public Sector Conference, which brings together leaders and decision-makers from across the public sector, education, and industry to discuss protecting and managing government data and networks. The Fal.Con for Public Sector Conference featured…

Asset Management Takes Center Stage as Government Moves to Secure Agency Networks

Earlier this month, President Biden signed a cybersecurity-focused executive order designed to put federal agencies on a path toward securing their networks and data. The executive order also aims to increase information sharing between the public and private sectors, and…

Four Reasons Why Hackers Are Targeting Schools During COVID

This article is part of a longer piece that was originally published on the NETSCOUT blog. Click HERE to read the original article in its entirety. We already know that cybercriminals have seized on the global COVID-19 pandemic as a…

Why AppSec is Essential for Today’s Software-Enabled Government

Software flaws remain some of the most exploited vulnerabilities by hackers and malicious actors. In fact, Forrester reports that vulnerable software and applications are the top cause of data breaches. Today, software is playing an increasingly mission-critical role across the…