Adapting Federal IT: Insights from 2023, Roadmap for 2024

The holiday season is officially over and the New Year has been ushered in, which means government IT departments are preparing their networks for a slew of federal cybersecurity mandates that must be met in 2024. But as they do…

Strengthening federal software supply chains through the power of automation

This article originally appeared on SteelCloud’s official blog, HERE. When you mix all the Executive Orders, NIST standards, SBOMs, CUI, and critical software together, your organization will have a more secure supply chain. But it’s all just a mishmash of…

Why the federal government’s lagging MFA adoption rate poses severe cyber risks to agency networks

According to Microsoft’s Vice President of Identity Security, Alex Weinert, only 25 percent of organizations today have adopted multi-factor authentication (MFA) as part of their overall cybersecurity infrastructure. That is a shining statistic when compared to 2017’s adoption rate of…

How federal government agencies can get the most out of their MFA implementation

Authentication is the new entry point into federal government networks. Most federal users know this, and more importantly, attackers know this as well. Federal agencies can no longer recommend changing passwords on a periodic basis and consider that an adequate…

5 ways federal government agencies can reduce risk from attack vectors

A data breach can be a catastrophic event for any federal government agency. One way to help curb potential exploits is to get a handle on potential attack vectors. An attack vector is the combination of a bad actor’s intentions…

Government Cybersecurity 2022 Priorities from Quest’s Chris Roberts

Government cybersecurity is at a critical junction. Faced with the rising threat of cyberattacks against physical supply chains and critical infrastructure, government agencies and organizations are looking for ways to safeguard their networks while still providing citizens with the service…

You’re a Mean One, Mr. Adversary

With COVID-19 keeping some families and friends apart, and supply chain issues limiting what’s available on store shelves, this might not feel like the normal holiday season to many Americans. But there is one thing that makes this holiday season…

How a Zero Trust Approach to Security Can Prepare Government IT for the Sophisticated Cyber Threats of 2022

Even though Cybersecurity Awareness Month has ended, it’s important to keep the discussion about securing government networks going year-round. While the need for cybersecurity has not necessarily changed, the ways cybercriminals operate have become far more sophisticated than ever before.…

Five ways to spot a phishing attack

Phishing has existed for almost two decades – and for very good reason. Everyone can be targeted by it. It’s still just as effective as ever. And there’s really no way for surefire way for security professionals to keep every…