It has been more than two years since President Biden released his Executive Order (EO) on Improving the Nation’s Cybersecurity. Paramount to this EO was the directive for federal agencies to move towards adopting and implementing zero trust cybersecurity architectures.…
AD migration and consolidation (Part 2)—The tools and best practices federal agencies should employ to reach their desired end-states
In our last article, the GovCyberHub sat down with Quest Software’s Chris Esler to examine the reasons why federal agencies migrate and consolidate their Active Directory (AD) environments, as well as delve into the many different benefits these processes deliver…
AD consolidation and migration (Part 1)—What federal agencies need to plan for and consider beforehand
As federal IT continues to evolve, it is not uncommon for government agencies to reorganize how they conduct business to match the pace of advancements in technologies. Add into the mix that administrations and leadership can change every four years,…
Why federal agencies must prioritize zero trust workforce training before FY24 deadline
This article originally appeared on Government Technology Insider. It’s no secret that the U.S. federal government operates in one of the world’s most threatened IT environments. When evaluating today’s federal cybersecurity landscape, it’s obvious that government agencies face more than…
How the U.S. Air Force is prioritizing interoperability, cybersecurity, and resiliency
A top priority for the Department of the Air Force (AF) (which includes both the Air Force and Space Force) is enhancing its access, partnership and integration capabilities across IT systems, but also other parts of government. The department’s vision…
How the Defense Industrial Base Can Prepare for CMMC Level 2+
The Defense Industrial Base (DIB), – the organizations that make up the U.S. Department of Defense’s (DoD) supply chain, is massive – comprised of hundreds of thousands of government contractors. With these organizations providing essential products, tools, and applications to…
Why a zero trust framework is the most effective at securing federal agency networks
As malicious cyber actors continue to improve and refine their techniques of penetrating and exploiting vulnerabilities in federal government agency networks, the single verification cybersecurity models that agencies have historically implemented are no longer capable of preventing breaches and attacks.…
Four Automation Targets That Can Help Overcome the Federal Cyber Workforce Shortage
Since the beginning of the COVID pandemic, cyberattacks have become increasingly frequent and sophisticated, looking to leverage a changing IT landscape that resulted as government agencies and their IT teams worked to enable the “new normal” of a distributed workforce.…
Improving Cyber Situational Awareness with Compliance Automation
Today’s federal government and military are facing workforce shortages and vacancies in many important positions. However, none of these vacancies are as potentially harmful to the security of our nation as the shortages that exist in our federal cybersecurity workforce.…
Nation-state attack on government validates concerns about AppSec and supply chain security
One of the top trends that we witnessed covering government and military cybersecurity in 2020 – aside from the massive upswing in threats that accompanied the ongoing COVID-19 pandemic – was a renewed and increased focus on securing the supply…