4 key ways to securing federal government networks

For the federal government, truly securing its IT infrastructures, networks, and systems requires embracing modern, cybersecurity frameworks and dogmas in a big way. One security architecture that government agencies are being strongly encouraged to adopt is zero trust. Zero trust…

New Year, New Breaches—Three modern identity attacks insights to know going into 2022

The beginning of a New Year is always a strangely quiet time for government agencies. The holidays have just ended, agency employees are slowly trickling back into work and settling back into their home offices, to sign in and begin…

You’re a Mean One, Mr. Adversary

With COVID-19 keeping some families and friends apart, and supply chain issues limiting what’s available on store shelves, this might not feel like the normal holiday season to many Americans. But there is one thing that makes this holiday season…

Choosing a Multifactor Authentication Technology

In the early days of computing, authentication was simple: If you wanted to log in to an IT system, you had to enter your username and password. If what you entered matched what the system had stored in its directory,…

Safeguard your data against a ransomware attack with these ten data protection principles

Last month, it was announced that a vulnerability in a remote management and monitoring tool utilized by many managed service providers (MSPs) had been exploited to launch a massive ransomware attack that impacted not only those MSPs but possibly their…

Why multi-factor authentication is essential for IAM

Identity and Access Management (IAM) is the art and science of ensuring that someone is who they say claim to be. This ensures that they have the correct level of access to systems and data – enough to do their…