Quest’s Chris Roberts on the current state of federal zero trust

It has been more than two years since President Biden released his Executive Order (EO) on Improving the Nation’s Cybersecurity. Paramount to this EO was the directive for federal agencies to move towards adopting and implementing zero trust cybersecurity architectures.…

US Navy outlines its cybersecurity pursuits at annual WEST Conference

This article originally appeared on TD SYNNEX’s official blog, HERE. The Department of Navy (DON) recently held its annual WEST Conference, this year with a strong emphasis on cybersecurity. The conference brought together key decision-makers from the Navy, Marine Corps,…

Why federal agencies must prioritize zero trust workforce training before FY24 deadline

This article originally appeared on Government Technology Insider. It’s no secret that the U.S. federal government operates in one of the world’s most threatened IT environments. When evaluating today’s federal cybersecurity landscape, it’s obvious that government agencies face more than…

Digital transformation driving cyber challenges – How modernization initiatives are creating risk in the public sector

2022 was an incredible year for the adoption of advanced technologies and modernization within the federal government and the U.S. military. But, while significant strides have been made in government digital transformation and modernization initiatives since the early days of…

12 Privileged Access Management best practices for federal agencies

No matter what risks a federal government agency is facing, you can draw a threat vector from that risk to a privileged account. Privileged accounts are the backbone of any operating agency, so it’s vital that these accounts are protected…

How the U.S. Air Force is prioritizing interoperability, cybersecurity, and resiliency

A top priority for the Department of the Air Force (AF) (which includes both the Air Force and Space Force) is enhancing its access, partnership and integration capabilities across IT systems, but also other parts of government. The department’s vision…

How federal government agencies are avoiding the pitfalls of cloud migration

This article originally appeared on SteelCloud’s official blog, HERE. It takes a great deal of planning to avoid the pitfalls of cloud migration. The pace of innovation, security, and, quite frankly, the technological threat is quickening. Updating legacy processes and systems has…

SteelCloud COO on why federal government agencies should take full advantage of the commercial cloud

As the federal government continues to ride the waves of digital transformation and network modernization, one decision that many agencies have decided to make has been to migrate their applications, workloads, and services – which have been traditionally managed on-prem…

What federal government security architects need to know about zero trust

For the federal government, a zero trust architecture assumes that all traffic on an agency’s internal network is potentially malicious. Consequently, it requires taking measures to: Authenticate all connections Identify all devices, users, applications, and services Ensure that traffic goes…

7 endpoint security best practices for federal government agencies

This article originally appeared on Quest Software’s official blog. Endpoints are always the entry point for data breaches. Given the impact a breach can have on federal government agencies, applying best practices for endpoint security is of paramount importance. The…