Skip links

State and Local Government

Category Archive Subtitle
Lock Blog Featured Image

Newly Launched Software Changes the Backup & Disaster Recovery Game

Purpose Built for Air Gapped Environments In the backup and recovery software market, there is a troubling gap for US public sector customers  operating in ‘no internet’ environments, including Department of Defense weapons testing sites, development labs / centers, training simulators, deployed tactical elements and
National Security Demands Blog Featured Image

National Security Demands Stronger Cybersecurity

A Thanksgiving State-of-Mind As families across America prepare to gather around the dinner table and nurse some turkey and pumpkin pie-induced food comas in the coming days, our country has much to appreciate. This time of year provides a welcome opportunity to remember the unique
DoDIN APL Certification Blog Featured Image

The DoDIN APL Certification: A Labor of Love

As the Department of Defense (DoD) and other US federal agencies seek to better protect themselves from pervasive and growing cyber threats, how can they maintain a security-oriented mindset when sourcing commercial off the shelf (COTS) products from outside vendors for use on sensitive networks?
blue chain link

Open Source Backdoors in the Wild

Open Source Backdoors in the Wild Malicious actors will take advantage of any opportunity to exploit an attack vector for money, personal gain, or fun. For years, hackers have used supply chains to deploy backdoors because trusted software provides a relatively easy entry point. This
CyberFit Tips Blog Featured Image

Trick or Treat Yo’self to Our Top 5 Cyberfit Tips

As you get your costumes and candy ready for Halloween, here’s another fun October fact – it’s National Cybersecurity Awareness Month! To help celebrate, Cyberfit Chip’s alter ego, Count Chipula, has turned to the good side this month, so he can offer up key tips to help
Firewall Ports Featured Image

99 Problems but Backup Firewall Ports Aren’t One

How do I love thee network engineer, let me count the ports. 3, that’s right just 3 ports (okay, maybe 5 if you want automated agent installs) you will need to open on your firewalls to get fantastic, fully functional data protection for your entire
Self-Protecting-Data-Diagram Blog Featured Image

Self-Protecting Data – A Future-Proof Cyber Doctrine

The Data Protection Evolution In the decades since cybersecurity became a key priority for companies and federal government agencies alike, we have witnessed a necessary evolution in information security doctrine and strategies. For years, layered data protection tools – from perimeter defense to identity management
Blog Banner Vote Stickers

Safeguarding Arizona’s Elections Is a Team Effort

Arizona’s Election Security Landscape With the 2020 campaign season well underway, US states are working hard to shore up their election systems before the upcoming primaries. Arizona has good reason to be a part of this nationwide reckoning: as Arizona’s Secretary of State Katie Hobbs