Continuous data protection has emerged as a form of data protection for federal government agencies that picks up where legacy backup approaches leave off. For decades, the standard of care in protecting federal data has been to run full scheduled…
9 insider threats that are impacting endpoint security
This article originally appeared on Quest Software’s official blog, HERE. Insider threats take several forms for federal government agencies. In a classic scenario, highly privileged contractors install spyware that exfiltrates sensitive data to them long after their project is complete.…
12 data governance tips that every federal agency should keep in mind
Data governance best practices ensure that your federal agency’s data is being created, collected, stored, and accessed by the right people for the right purpose. Which processes have you put in place to manage access, availability, usability, quality and security?…
How multi-factor authentication is bolstering federal agencies’ cybersecurity postures
As threats to password security have increased in recent years, multi-factor authentication (MFA) has rapidly gained popularity as a method for increasing the assurance of authentication for federal government networks and applications. MFA is important, as it hardens the cybersecurity…
Modern strategies federal agencies can take for endpoint management and the migration to cloud
When COVID-19 reached American shores, most of the federal government agencies moved their processes and procedures online, accelerating a digital transformation that has been underway for decades. While the pandemic demonstrated the tremendous potential digital transformation presents to federal government…
How immutable backups are protecting the federal government from ransomware attacks
This article originally appeared on Quest Software’s official blog. Immutable backups play an increasingly important role in helping federal government agencies protect themselves from the catastrophic impact of ransomware. Agencies and the data they produce are continually changing, so your…
How federal agencies can protect themselves from Active Directory attack paths
At the forefront of almost all of today’s cybersecurity discussions within federal government agencies are attack paths. But what are attack paths, and what makes Active Directory particularly vulnerable to them? And what can government agencies do to protect themselves?…
How Azure Government delivers emerging cloud capabilities at a classified level
When a new cybersecurity, database management, or cloud solution debuts on the commercial market, there is almost always a lengthy waiting period before the technology trickles down into the hands of federal government agencies. Due to the government’s significantly heightened…
How DoD organizations can get a handle on zero trust
As the U.S. Department of Defense (DoD) continues to transition and adopt zero trust cybersecurity frameworks for its IT networks and infrastructure, the Department is also urging all of its disparate agencies and organizations to follow suit. But before DoD…
4 key ways to securing federal government networks
For the federal government, truly securing its IT infrastructures, networks, and systems requires embracing modern, cybersecurity frameworks and dogmas in a big way. One security architecture that government agencies are being strongly encouraged to adopt is zero trust. Zero trust…