12 Privileged Access Management best practices for federal agencies

No matter what risks a federal government agency is facing, you can draw a threat vector from that risk to a privileged account. Privileged accounts are the backbone of any operating agency, so it’s vital that these accounts are protected…

How federal government agencies can get the most out of their MFA implementation

Authentication is the new entry point into federal government networks. Most federal users know this, and more importantly, attackers know this as well. Federal agencies can no longer recommend changing passwords on a periodic basis and consider that an adequate…

9 insider threats that are impacting endpoint security

This article originally appeared on Quest Software’s official blog, HERE. Insider threats take several forms for federal government agencies. In a classic scenario, highly privileged contractors install spyware that exfiltrates sensitive data to them long after their project is complete.…

WVDEP CIO explains how digital transformation enhanced the state agency’s cybersecurity and boosted productivity

When COVID-19 reached American shores, state and local government agencies and educational organizations (SLED) had to abruptly and suddenly find a way to operate in a world with no face-to-face, in-person interaction. This forced many of them to turn to…

How multi-factor authentication is bolstering federal agencies’ cybersecurity postures

As threats to password security have increased in recent years, multi-factor authentication (MFA) has rapidly gained popularity as a method for increasing the assurance of authentication for federal government networks and applications. MFA is important, as it hardens the cybersecurity…

4 key ways to securing federal government networks

For the federal government, truly securing its IT infrastructures, networks, and systems requires embracing modern, cybersecurity frameworks and dogmas in a big way. One security architecture that government agencies are being strongly encouraged to adopt is zero trust. Zero trust…

9 Steps to make cybersecurity everyone’s duty this CSAM according to CrowdStrike

As Cybersecurity Awareness month continues on, many around the industry are reviewing many of the best practices that have helped safeguard government agencies as they have adapted to modern threats. Information security professionals have had to address a number of…

Why multi-factor authentication is essential for IAM

Identity and Access Management (IAM) is the art and science of ensuring that someone is who they say claim to be. This ensures that they have the correct level of access to systems and data – enough to do their…