For federal government agencies, it is not only a priority but a mandated requirement that the contractors and vendors they do business with have hardened cybersecurity compliance controls that secure their networks and protect the data and information they house.…
Quest Public Sector on the 5 cybersecurity benefits tiered administration delivers to the federal government
While operating within an ever evolving and complex cybersecurity landscape, federal agencies face difficult decisions around what to prioritize for protection and recovery in the face of advanced security threats. There are a few things that can be done to…
7 ways the federal government can overcome cloud migration challenges
This article originally appeared on Quest Software’s official blog, HERE. Cloud migration challenges — capacity, throughput, performance and above all security — confront everyone in federal government agencies from leaders and managers to users. Digital transformation has been well documented…
SteelCloud’s Brian Hajost on how federal agencies can effectively secure their software supply chains
As federal government agencies and the military continue to build upon the modernization efforts they’ve made across their workflows and services, it is critical that they carefully consider the cyber risks that each newly acquired application and piece of software…
Quest’s Chris Roberts on the current state of federal zero trust
It has been more than two years since President Biden released his Executive Order (EO) on Improving the Nation’s Cybersecurity. Paramount to this EO was the directive for federal agencies to move towards adopting and implementing zero trust cybersecurity architectures.…
AD migration and consolidation (Part 2)—The tools and best practices federal agencies should employ to reach their desired end-states
In our last article, the GovCyberHub sat down with Quest Software’s Chris Esler to examine the reasons why federal agencies migrate and consolidate their Active Directory (AD) environments, as well as delve into the many different benefits these processes deliver…
AD consolidation and migration (Part 1)—What federal agencies need to plan for and consider beforehand
As federal IT continues to evolve, it is not uncommon for government agencies to reorganize how they conduct business to match the pace of advancements in technologies. Add into the mix that administrations and leadership can change every four years,…
Why federal agencies must prioritize zero trust workforce training before FY24 deadline
This article originally appeared on Government Technology Insider. It’s no secret that the U.S. federal government operates in one of the world’s most threatened IT environments. When evaluating today’s federal cybersecurity landscape, it’s obvious that government agencies face more than…
12 Privileged Access Management best practices for federal agencies
No matter what risks a federal government agency is facing, you can draw a threat vector from that risk to a privileged account. Privileged accounts are the backbone of any operating agency, so it’s vital that these accounts are protected…