As federal government agencies continue modernizing their operating environments through cloud adoption, it is more than likely that each agency has a multitude of different cloud applications that are being utilized at one time. Some of these applications might be…
How cyber hackers are leveraging Group Policy infrastructures to penetrate federal networks
When the average federal employee logs into their workstation at the beginning of the day, it’s more than likely they are unaware of the thousands of unseen configurations and network controls that power their IT infrastructure. Some portions of the…
How the NIST Framework sets out to protect federal agencies’ AD environments
February 2021 was a moment in time where federal agencies were knee deep in modernizing their IT infrastructures to accommodate the digitized new normal of their processes, workflows, and services. But while the federal government was busy digitally transforming their…
Creating a cyber crisis management plan- 6 key priorities federal agencies should focus on
In today’s digital age, technology is rapidly advancing—making it easier for federal government agencies to better serve their constituents and assist their internal workforces in streamlining and facilitating agency workflows and processes. However, these technological leaps have created a massive…
How federal government agencies can get the most out of their MFA implementation
Authentication is the new entry point into federal government networks. Most federal users know this, and more importantly, attackers know this as well. Federal agencies can no longer recommend changing passwords on a periodic basis and consider that an adequate…
How federal agencies can keep up with the evolution of identity supply chains
Three years after COVID-19 forced federal agencies to crank their modernization dials to warp speed, the proliferation and adoption of new technologies, applications, and network solutions are still continuing to spread throughout the federal government. Though these technologies have completely…
Modern strategies federal agencies can take for endpoint management and the migration to cloud
When COVID-19 reached American shores, most of the federal government agencies moved their processes and procedures online, accelerating a digital transformation that has been underway for decades. While the pandemic demonstrated the tremendous potential digital transformation presents to federal government…
How federal agencies can protect themselves from Active Directory attack paths
At the forefront of almost all of today’s cybersecurity discussions within federal government agencies are attack paths. But what are attack paths, and what makes Active Directory particularly vulnerable to them? And what can government agencies do to protect themselves?…
How Azure Government delivers emerging cloud capabilities at a classified level
When a new cybersecurity, database management, or cloud solution debuts on the commercial market, there is almost always a lengthy waiting period before the technology trickles down into the hands of federal government agencies. Due to the government’s significantly heightened…