While operating within an ever evolving and complex cybersecurity landscape, federal agencies face difficult decisions around what to prioritize for protection and recovery in the face of advanced security threats. There are a few things that can be done to…
Why federal agencies must prioritize zero trust workforce training before FY24 deadline
This article originally appeared on Government Technology Insider. It’s no secret that the U.S. federal government operates in one of the world’s most threatened IT environments. When evaluating today’s federal cybersecurity landscape, it’s obvious that government agencies face more than…
How cyber hackers are leveraging Group Policy infrastructures to penetrate federal networks
When the average federal employee logs into their workstation at the beginning of the day, it’s more than likely they are unaware of the thousands of unseen configurations and network controls that power their IT infrastructure. Some portions of the…
How federal agencies can defend themselves against ransomware
Ransomware is an all-too-real threat in today’s world. Malicious cyber actors have expanded their ransomware techniques, resulting in breaches of anything from K-12 educational institutions, government agencies, and even high-profile brands like Garmin and Uber. In a recent webinar hosted…
Digital transformation driving cyber challenges – How modernization initiatives are creating risk in the public sector
2022 was an incredible year for the adoption of advanced technologies and modernization within the federal government and the U.S. military. But, while significant strides have been made in government digital transformation and modernization initiatives since the early days of…
Ransomware and SLED – Why K-12 institutions and municipalities are juicy targets for hackers
This article originally appeared on TD Synnex’s official blog, HERE. Ransomware attacks against K-12 educational institutions have been on the rise in recent years, and the Cybersecurity and Infrastructure Security Agency (CISA) has taken notice. School networks have become juicy…
What federal agencies need to know about continuous data protection
Continuous data protection has emerged as a form of data protection for federal government agencies that picks up where legacy backup approaches leave off. For decades, the standard of care in protecting federal data has been to run full scheduled…
How CISA can assist federal agencies in navigating the “Wild, Wild, West” of cyber defense
Over the past decade, cybercrime has proven to be one of the greatest threats facing the American public. One can look to the unprecedented Colonial Pipeline attack as a prime example. This cyberattack led to millions of Americans being denied…
The current state of government AppSec and the threats agency developers face
For IT professionals who develop the technologies, applications, and services that federal, state, and local government agencies employ, there is one specific challenge that they always find themselves brushing up against. When government agencies request new applications and expect them…