This article originally appeared on SteelCloud’s official blog, HERE. When you mix all the Executive Orders, NIST standards, SBOMs, CUI, and critical software together, your organization will have a more secure supply chain. But it’s all just a mishmash of…
Creating a cyber crisis management plan- 6 key priorities federal agencies should focus on
In today’s digital age, technology is rapidly advancing—making it easier for federal government agencies to better serve their constituents and assist their internal workforces in streamlining and facilitating agency workflows and processes. However, these technological leaps have created a massive…
How federal government agencies can get the most out of their MFA implementation
Authentication is the new entry point into federal government networks. Most federal users know this, and more importantly, attackers know this as well. Federal agencies can no longer recommend changing passwords on a periodic basis and consider that an adequate…
5 ways federal government agencies can reduce risk from attack vectors
A data breach can be a catastrophic event for any federal government agency. One way to help curb potential exploits is to get a handle on potential attack vectors. An attack vector is the combination of a bad actor’s intentions…
Government Cybersecurity 2022 Priorities from Quest’s Chris Roberts
Government cybersecurity is at a critical junction. Faced with the rising threat of cyberattacks against physical supply chains and critical infrastructure, government agencies and organizations are looking for ways to safeguard their networks while still providing citizens with the service…
You’re a Mean One, Mr. Adversary
With COVID-19 keeping some families and friends apart, and supply chain issues limiting what’s available on store shelves, this might not feel like the normal holiday season to many Americans. But there is one thing that makes this holiday season…
How a Zero Trust Approach to Security Can Prepare Government IT for the Sophisticated Cyber Threats of 2022
Even though Cybersecurity Awareness Month has ended, it’s important to keep the discussion about securing government networks going year-round. While the need for cybersecurity has not necessarily changed, the ways cybercriminals operate have become far more sophisticated than ever before.…
Five ways to spot a phishing attack
Phishing has existed for almost two decades – and for very good reason. Everyone can be targeted by it. It’s still just as effective as ever. And there’s really no way for surefire way for security professionals to keep every…
Securing school networks in the age of COVID-19
We are in the midst of a dramatic global cultural change due to the COVID-19 pandemic. Online education and remote work environments that were once flexible options are now becoming the new normal — and demand is only increasing. Due…