9 reasons why federal government agencies need identity governance and administration

This article originally appeared on One Identity by Quest’s official blog, here. While government agency networks continue to grow and increase their number of network users, access points, permissions, and privileges, their cyberattack surfaces are inevitably going to expand alongside…

5 common risks to successful cloud migration and data diversity strategies

State and local government agencies are changing fast to keep up with today’s constituent demands. A critical component to keeping pace with these demands is the adoption of new technologies, processes and solutions that are being driven by digital transformation.…

Four Best Practices for Leveraging the Cloud for Data Protection

Everything is not the same for applications and data, so why treat everything the same for cloud cyber security and data protection? This question was the primary driver of a recent webinar hosted by Quest, titled Best Practices for Using…

Using STIGs to Accelerate CDM Compliance

As part of the Executive Order on Improving the Nation’s Cybersecurity (Executive Order), Federal Civilian Executive Branch (FCEB) Agencies need to establish or update their Memoranda of Agreement with CISA for the CDM (Continuous Diagnostics and Mitigation) program ensure that…

Five Characteristics of an Effective Common Cybersecurity Technology Stack

This article is part of a larger piece that was published on the NETSCOUT blog. To read the original in its entirety, click HERE. The last few years have seen several far-reaching cyberattacks against our nation’s critical infrastructure and essential…

Stop Cloud Breaches with an Adversary-Focused Approach to Security

This article originally appeared on the CrowdStrike Blog and can be viewed here. It should come as no surprise that as enterprise and government IT networks moved towards the cloud and decentralized their networks, attackers updated their cyberattack methods accordingly.…

Cloud Navigator – Charting a Course to More Secure IT Solutions

This article was originally published on GovDevSecOpsHub, that article can be found here. Today it is quite uncontroversial to say that the cloud is here and that it is not going anywhere anytime soon. Two years ago, this was a…

Four necessary considerations for securing cloud-based government IT

Government IT is unique from enterprise IT in many varied and distinct ways, however, one that transcends both the public and private sectors is the need to balance money in with money out. When looking towards a future with more…

NETSCOUT CIO shares 4 ways the digital transformation makes organizations run more effectively and securely

The digital transformation of the IT space has been one of the few bright spots over the last year and a half. Embracing the cloud and utilizing it to facilitate work has empowered organizations like never before. It was, however,…

Dr. Andreas Weigend to give “data dilemma” keynote address at Quest EMPOWER 2021

As federal government agencies become more innovative with their data, it is critical that they have comprehensive knowledge of the latest trends, best practices, and technologies for their data systems. That is why Quest is holding its first annual Quest…