article thumbnail

Enhancing Security with CISA’s ScubaGear Baselines for M365

Microsoft Public Sector

In today's digital age, securing an organization's information is more critical than ever. The Cybersecurity and Infrastructure Security Agency (CISA) stood up a program called Secure Cloud Business Applications (SCuBA). Baseline implementation guides can be found at Secure Cloud Business Applications (SCuBA) Project | CISA.

Security 136
article thumbnail

Preparing for Security Copilot in US Government Clouds

Microsoft Public Sector

With the announcement of Security Copilot back in March, there has been a growing demand to understand and expand the role of machine learning (ML) in security. This demand is especially apparent in the US government space, where these advancements have a direct impact on national security.

Security 119
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

Make Secure Constituent Engagements Stress-Free

GovLoop

Unfortunately, a number of factors can get in the way of ensuring secure and stress-free digital interactions for state and local constituents, including: Bad actors are well aware of vulnerabilities in backend outdated solutions, yet IT departments may lack the resources to keep these systems patched.

article thumbnail

How GSA Secures Its Hybrid Workforce

GovLoop

To expound on that and meet new compliance requirements, GSA efforts began to dovetail with the White House Executive Order on cybersecurity from May 2021 and its emphasis on adopting security best practices, centered on a zero-trust security strategy. Favorite

article thumbnail

The Ultimate Playground Inspection Handbook

Whether you're a playground owner or are maintenance personnel, this handbook equips you with the knowledge and tools needed to create a secure and enjoyable play environment. Download today! Embrace peace of mind knowing that you're taking proactive steps to safeguard the well-being of young ones as they explore and have fun.

article thumbnail

Don’t Sleep on Modern Security 

GovLoop

Logging, monitoring and auditing are essential components of maintaining security and identifying vulnerabilities. Access Controls: Just as users’ passwords should be rotated every 90 days or so, security keys need to be changed with regularity. Effective key management requires that cryptographic keys have a designated lifespan.

article thumbnail

Transform Your Agency’s Security Posture with a New Offer from Workspace

Google Public Sector

Recent events have underscored the critical need for robust cloud security. The Cyber Safety Review Board's (CSRB) in-depth analysis of the Microsoft Exchange Online intrusion, detailed in this blog post CSRB report highlights the need for new approaches to securing the public sector , reveals vulnerabilities that can impact any organization.