3 ways federal agencies can optimize and strengthen their user authentication methods

Cloud computing services and applications have surprisingly been around since the late-1990s and have slowly been adopted across federal government agencies since then. But when COVID-19 took the world by storm in 2020, this crawling pace had to change as…

WVDEP CIO explains how digital transformation enhanced the state agency’s cybersecurity and boosted productivity

When COVID-19 reached American shores, state and local government agencies and educational organizations (SLED) had to abruptly and suddenly find a way to operate in a world with no face-to-face, in-person interaction. This forced many of them to turn to…

Modern strategies federal agencies can take for endpoint management and the migration to cloud

When COVID-19 reached American shores, most of the federal government agencies moved their processes and procedures online, accelerating a digital transformation that has been underway for decades. While the pandemic demonstrated the tremendous potential digital transformation presents to federal government…

7 best practices for approaching patch management within government agencies

This article originally appeared on Quest Software’s official blog. Let’s face it, all software eventually has vulnerabilities, it always has and always will. No matter how good developers are at writing software, there will inevitably be mistakes, and there will…

The changing role of cyber resiliency planning for government agencies

The ongoing COVID-19 pandemic forced government agencies to expedite their digital transformation initiatives and embrace new technologies in an effort to enable their workforces to operate remotely. With the potential for employees to possibly get sick or perish, agencies moved…

The three weak links in the Connectivity Supply Chain and how to protect it

At NETSCOUT, we refer to all of the technologies and services that enable companies and individuals to stay connected to the internet as the Connectivity Supply Chain. This includes services that underpin all interconnected devices—enterprise Internet of Things (IoT) devices…

Quest’s Chris Robert unpacks the 2021 cybersecurity landscape and discusses what to expect in 2022

Last month, the worldwide IT community recognized and celebrated Cybersecurity Awareness Month, a time where cyber professionals from around the globe reflected on the cybersecurity landscape from the past year and explored how to make online ecosystems more safe and…

Why government agencies must move beyond firewall protection as the end-all and be-all of protection

Firewalls are a critical part of the modern cybersecurity paradigm, but they are not likely to be enough to defend against many common cyberattacks. One, in particular, DDoS attacks, present a unique challenge for firewalls, according to NETSCOUT’s Richard Hummel,…

How to spare your agency’s VPN from a DDoS attack

With National Cybersecurity Month continuing in earnest, there continue to be many excellent conversations on how to best create and maintain a robust cybersecurity policy. A key concern that has taken on new importance during the COVID-19 pandemic is the…

With a zero trust framework, federal agencies can block hackers at every turn

According to Quest Software, there are two types of government agencies: those that have been breached and those that are going to be breached. Modern hackers are easily bypassing traditional network protections used by today’s federal agencies. They use tactics…