Why a CBOM is the cyber compliance solution every government agency needs

This article originally appeared on SteelCloud’s official blog, HERE. A software bill of materials (SBOM) is something everyone in the cybersecurity field knows and understands. It was even mandated by President Biden in his Executive Order on Improving Our Nation’s…

Why cloud adoption is gaining steam within SLED organizations

This article originally appeared on the TD SYNNEX blog, HERE. Cloud services continue to be a top priority for state chief information officers (CIOs), but the focus has accelerated due to the emergence of digital government and disruptions brought on by…

Rules before tools: Securing cyber and software supply chains with C-SCRM

As cyber and software supply chain threats continue to increase in volume, government agencies must take into consideration how vulnerable their supply chains are to potentially catastrophic cyber-attacks.   In a recent webinar hosted by Digital Government Institute, Brian Paap,…

SteelCloud COO on why federal government agencies should take full advantage of the commercial cloud

As the federal government continues to ride the waves of digital transformation and network modernization, one decision that many agencies have decided to make has been to migrate their applications, workloads, and services – which have been traditionally managed on-prem…

Five ways to spot a phishing attack

Phishing has existed for almost two decades – and for very good reason. Everyone can be targeted by it. It’s still just as effective as ever. And there’s really no way for surefire way for security professionals to keep every…

Quest’s Chris Robert unpacks the 2021 cybersecurity landscape and discusses what to expect in 2022

Last month, the worldwide IT community recognized and celebrated Cybersecurity Awareness Month, a time where cyber professionals from around the globe reflected on the cybersecurity landscape from the past year and explored how to make online ecosystems more safe and…

Four added benefits of identity and access management

The global, dynamic, and interconnected nature of IT enterprises today – and a proliferation of security threats – require protections that limit the damage attackers can do once they’re inside the agency firewall. Knowing that cybersecurity threats are only increasing…

Four key cyber considerations for a post-pandemic world

This article originally appeared on the NETSCOUT blog. Click here to read the original in its entirety. The need for organizations and government agencies to shift and evolve quickly in light of the COVID-19 pandemic resulted in large-scale change for remote access…

When it comes to security, not all cloud providers are equal

All federal government agencies, including the DoD, have been required to adhere to certain compliance requirements. These requirements are meant to inject consistency and confidence in the security of a cloud provider solution. And security is top of mind for…

WIZARD SPIDER unleashes Conti ransomware to extort millions

Threat actors continue to find new ways of disrupting life for their own financial gain. And sometimes their new ways are modifications of previously effective malware or ransomware, usually with an added punch. In the last year, the damaging Ryuk…