How federal government agencies can get the most out of their MFA implementation

Authentication is the new entry point into federal government networks. Most federal users know this, and more importantly, attackers know this as well. Federal agencies can no longer recommend changing passwords on a periodic basis and consider that an adequate…

5 ways federal government agencies can reduce risk from attack vectors

A data breach can be a catastrophic event for any federal government agency. One way to help curb potential exploits is to get a handle on potential attack vectors. An attack vector is the combination of a bad actor’s intentions…

Government Cybersecurity 2022 Priorities from Quest’s Chris Roberts

Government cybersecurity is at a critical junction. Faced with the rising threat of cyberattacks against physical supply chains and critical infrastructure, government agencies and organizations are looking for ways to safeguard their networks while still providing citizens with the service…

You’re a Mean One, Mr. Adversary

With COVID-19 keeping some families and friends apart, and supply chain issues limiting what’s available on store shelves, this might not feel like the normal holiday season to many Americans. But there is one thing that makes this holiday season…

How a Zero Trust Approach to Security Can Prepare Government IT for the Sophisticated Cyber Threats of 2022

Even though Cybersecurity Awareness Month has ended, it’s important to keep the discussion about securing government networks going year-round. While the need for cybersecurity has not necessarily changed, the ways cybercriminals operate have become far more sophisticated than ever before.…

Five ways to spot a phishing attack

Phishing has existed for almost two decades – and for very good reason. Everyone can be targeted by it. It’s still just as effective as ever. And there’s really no way for surefire way for security professionals to keep every…

Securing school networks in the age of COVID-19

We are in the midst of a dramatic global cultural change due to the COVID-19 pandemic. Online education and remote work environments that were once flexible options are now becoming the new normal — and demand is only increasing. Due…

CIO of the Illinois State Treasurer’s Office on the importance of executive buy-in to cyber initiatives

When we think about the types of companies and organizations that are often targets of cyberattacks, we tend to think about the companies with something that e-criminals want. These are crimes being perpetrated by criminals, after all. They wouldn’t take…

31,000 potential targets – OU’s CISO describes the herculean task of protecting university networks

With an enrollment of approximately 31,000 young people – all raised on new technologies and clearly digital natives – you would think that a large university like the University of Oklahoma (OU) would have no problem keeping its networks and…

James Yeager Lays Out the Fed and SLED Threat Landscape in Advance of Fal.con for Public Sector

You would think that – in the midst of a global pandemic that is confirmed to have killed almost 500,000 people worldwide – that the healthcare organizations working to find a cure would be able to conduct their work and…