This article originally appeared on Quest Software’s official blog, HERE. It may come as a surprise that for many years the concept of least privilege was foreign in a Windows network. It would not have been uncommon in the past…
How CISA can assist federal agencies in navigating the “Wild, Wild, West” of cyber defense
Over the past decade, cybercrime has proven to be one of the greatest threats facing the American public. One can look to the unprecedented Colonial Pipeline attack as a prime example. This cyberattack led to millions of Americans being denied…
9 insider threats that are impacting endpoint security
This article originally appeared on Quest Software’s official blog, HERE. Insider threats take several forms for federal government agencies. In a classic scenario, highly privileged contractors install spyware that exfiltrates sensitive data to them long after their project is complete.…
7 best practices for approaching patch management within government agencies
This article originally appeared on Quest Software’s official blog. Let’s face it, all software eventually has vulnerabilities, it always has and always will. No matter how good developers are at writing software, there will inevitably be mistakes, and there will…