12 Privileged Access Management best practices for federal agencies

No matter what risks a federal government agency is facing, you can draw a threat vector from that risk to a privileged account. Privileged accounts are the backbone of any operating agency, so it’s vital that these accounts are protected…

How the U.S. Air Force is prioritizing interoperability, cybersecurity, and resiliency

A top priority for the Department of the Air Force (AF) (which includes both the Air Force and Space Force) is enhancing its access, partnership and integration capabilities across IT systems, but also other parts of government. The department’s vision…

How federal government agencies are avoiding the pitfalls of cloud migration

This article originally appeared on SteelCloud’s official blog, HERE. It takes a great deal of planning to avoid the pitfalls of cloud migration. The pace of innovation, security, and, quite frankly, the technological threat is quickening. Updating legacy processes and systems has…

SteelCloud COO on why federal government agencies should take full advantage of the commercial cloud

As the federal government continues to ride the waves of digital transformation and network modernization, one decision that many agencies have decided to make has been to migrate their applications, workloads, and services – which have been traditionally managed on-prem…

What federal government security architects need to know about zero trust

For the federal government, a zero trust architecture assumes that all traffic on an agency’s internal network is potentially malicious. Consequently, it requires taking measures to: Authenticate all connections Identify all devices, users, applications, and services Ensure that traffic goes…

7 endpoint security best practices for federal government agencies

This article originally appeared on Quest Software’s official blog. Endpoints are always the entry point for data breaches. Given the impact a breach can have on federal government agencies, applying best practices for endpoint security is of paramount importance. The…

The Environmental Protection Agency and its Zero Trust Journey

This article originally appeared on DLT Solutions’ official blog, “Technically Speaking.”  In a recent webinar produced by Federal News Network, the Director of the Environmental Protection Agency (EPA)’s Office of Information Security and Privacy, Tonya Manning, detailed the state of…

The Early Bird Gets the Worm, When It Comes to CMMC and the DIB

This article originally appeared on SteelCloud’s official blog site. The Department of Defense’s CMMC (Cybersecurity Maturity Model Certification) program has undergone multiple changes, revisions, updates, and organizational shifts over the last two and a half years. As a result, DoD…

Federal government looks to bolster cybersecurity infrastructures due to heightened security threats

This article originally appeared on the official DLT Solutions blog. The heightened threat of retaliatory cyberattacks by Russia against critical U.S. IT infrastructure is prompting federal investments in cybersecurity to strengthen its cyber defense posture. The ongoing conflict in the…

How Azure Government delivers emerging cloud capabilities at a classified level

When a new cybersecurity, database management, or cloud solution debuts on the commercial market, there is almost always a lengthy waiting period before the technology trickles down into the hands of federal government agencies. Due to the government’s significantly heightened…