Quest Public Sector on the 5 cybersecurity benefits tiered administration delivers to the federal government

While operating within an ever evolving and complex cybersecurity landscape, federal agencies face difficult decisions around what to prioritize for protection and recovery in the face of advanced security threats. There are a few things that can be done to…

How automating CIS compliance strengthens federal data security

This article originally appeared on SteelCloud’s official blog, HERE. As malicious cyber actors’ methods and tactics continue to increase in sophistication and effectiveness, having your company achieve certain cybersecurity compliance standards has become more important than ever. It protects your…

Quest’s Chris Roberts on how federal agencies can bridge the skills gap between legacy Active Directory and Azure

It is a well-known fact that the majority of federal government agencies utilize on-premise Active Directory (AD) as the primary directory service for their IT infrastructures. But with the federal government encouraging agencies to follow aspirational federal IT initiatives like…

Active Directory Management (Part 2) – How automated and enhanced AD management tools sharpen federal cybersecurity

In our last article, the GovCyberHub sat down with Eric Weiss, Sr. Technology Executive at Quest Software Public Sector, Inc., to examine the current state of federal agencies’ Active Directory environments. This week, Eric returns to take a deep dive…

Active Directory Management (Part 1) – Quest’s Senior Technology Executive examines the current state of federal agencies’ AD environments

It’s hard to believe that it has been 23 years since Microsoft’s Active Directory (AD) was released. Since its debut as a part of Windows 2000 Server, AD has gone through many evolutions and iterations to become the complex platform…

Why cloud adoption is gaining steam within SLED organizations

This article originally appeared on the TD SYNNEX blog, HERE. Cloud services continue to be a top priority for state chief information officers (CIOs), but the focus has accelerated due to the emergence of digital government and disruptions brought on by…

3 ways federal agencies can optimize and strengthen their user authentication methods

Cloud computing services and applications have surprisingly been around since the late-1990s and have slowly been adopted across federal government agencies since then. But when COVID-19 took the world by storm in 2020, this crawling pace had to change as…

The four-pronged, app migration approach federal agencies can take in Azure AD

As federal government agencies continue modernizing their operating environments through cloud adoption, it is more than likely that each agency has a multitude of different cloud applications that are being utilized at one time. Some of these applications might be…

Why federal agencies must prioritize zero trust workforce training before FY24 deadline

This article originally appeared on Government Technology Insider. It’s no secret that the U.S. federal government operates in one of the world’s most threatened IT environments. When evaluating today’s federal cybersecurity landscape, it’s obvious that government agencies face more than…

What federal agencies need to know about continuous data protection

Continuous data protection has emerged as a form of data protection for federal government agencies that picks up where legacy backup approaches leave off. For decades, the standard of care in protecting federal data has been to run full scheduled…