Cloud computing services and applications have surprisingly been around since the late-1990s and have slowly been adopted across federal government agencies since then. But when COVID-19 took the world by storm in 2020, this crawling pace had to change as…
Creating a cyber crisis management plan- 6 key priorities federal agencies should focus on
In today’s digital age, technology is rapidly advancing—making it easier for federal government agencies to better serve their constituents and assist their internal workforces in streamlining and facilitating agency workflows and processes. However, these technological leaps have created a massive…
Emerging threats against workload identities in Azure AD and what federal agencies should do about it
Throughout the last decade, identity theft has become a gold mine for cybercriminals, due to vulnerabilities that accompany all of the emerging technologies that organizations and individuals use in everyday life. Many people are already aware that theft is a…
Digital transformation driving cyber challenges – How modernization initiatives are creating risk in the public sector
2022 was an incredible year for the adoption of advanced technologies and modernization within the federal government and the U.S. military. But, while significant strides have been made in government digital transformation and modernization initiatives since the early days of…
12 Privileged Access Management best practices for federal agencies
No matter what risks a federal government agency is facing, you can draw a threat vector from that risk to a privileged account. Privileged accounts are the backbone of any operating agency, so it’s vital that these accounts are protected…
How federal government agencies can get the most out of their MFA implementation
Authentication is the new entry point into federal government networks. Most federal users know this, and more importantly, attackers know this as well. Federal agencies can no longer recommend changing passwords on a periodic basis and consider that an adequate…
9 insider threats that are impacting endpoint security
This article originally appeared on Quest Software’s official blog, HERE. Insider threats take several forms for federal government agencies. In a classic scenario, highly privileged contractors install spyware that exfiltrates sensitive data to them long after their project is complete.…
How multi-factor authentication is bolstering federal agencies’ cybersecurity postures
As threats to password security have increased in recent years, multi-factor authentication (MFA) has rapidly gained popularity as a method for increasing the assurance of authentication for federal government networks and applications. MFA is important, as it hardens the cybersecurity…