With growing cyber threats from abroad targeting critical infrastructure and a push to bolster cybersecurity for the U.S. presidential election, it is more important than ever for agencies to be locked down from foreign hacks. […]

In a recent interview, Travis Steele, chief architect at Red Hat, discussed best practices for virtualization today, how virtualization and containers can coexist, and how a common platform for both creates a pathway to modernization. […]

In a recent interview with MeriTalk, Tony Holmes, public sector practice lead for solutions architects at Pluralsight, discusses how Federal organizations can gain this vital knowledge of employee skills in a workplace increasingly transformed by artificial intelligence (AI) and other emerging technologies. […]

In this report, you’ll uncover the insights you need to fill critical skills gaps, overcome challenges, and create a culture of learning that drives sustainable upskilling engagement. […]

MeriTalk recently sat down with Travis Rosiek, public sector chief technology officer at Rubrik, to discuss the current threat landscape and the changes in the updated framework that help agencies and organizations plan for worst-case cyberattack scenarios. […]

Federal cybersecurity teams are struggling to get ahead of adversaries, resulting in threat actors gaining access to sensitive government systems and data. […]

The U.S. armed forces have maintained their status as the world’s top military power in large part because of their ability to use data in making good decisions during combat. This information dominance is derived from the ability to incorporate data from a variety of sources quickly and comprehensively. […]

This issue brief explores the intricate relationship between AI, JADC2, and cybersecurity, highlighting the critical measures necessary to protect the DoD’s networks from sophisticated cyber threats. […]

As Federal agencies ramp up their defenses against potential cyberattacks, the threat landscape grows ever more worrisome. Nation-state actors are using cyber threats to soften the ground for physical attacks, steal secrets, and impose economic costs on America. Targets include Federal agencies such as the Department of Energy, which governs the energy sector, defense agencies, and critical infrastructure. […]

MeriTalk recently sat down with Travis Rosiek, public sector chief technology officer at Rubrik, to discuss the current threat landscape and the changes in the updated framework that help agencies and organizations plan for worst-case cyberattack scenarios. […]

In a recent interview with MeriTalk, Peter Romness, the cybersecurity principal in the CISO Advisor’s Office at Cisco Systems, offered expert tips to agencies on how they can make faster progress – often with existing tools – in boosting cybersecurity and meeting the Federal mandates. […]

Learn how the Dell Technologies approach to zero trust brings together the expertise and end-to-end intelligent solutions to help Federal agencies simply, securely, and responsibly innovate and collaborate to deliver data-driven breakthrough experiences for your customers and your workforce, no matter where the mission takes them. […]

Download the issue brief, “Bring Fragmented Identity Ecosystems Together With a Federation Hub,” to learn how identity federation modernizes ICAM systems, enabling users in multiple organizations to access the same networks, applications, and resources. With identity federation, agencies can facilitate secure collaboration and meet Federal zero trust requirements. […]

This video and podcast will show how federated identity management and attribute-based access control can address authentication and authorization challenges and enable the right access, at the right time – in any environment. It will also explore how authorization policy scaling, device-level and identity vetting, and assurance-level signaling enable agencies to quickly adapt to threats. […]

In today’s fast paced world, the pursuit of excellence is a relentless journey. From the past eight State of the Software Supply Chain reports, we know that developer productivity soars when they have access to superior tools and better open source components, making them the driving force behind better security and better products. In this report, get an in-depth update on open source, and gain insights on the path to a more efficient, cost-eff­ective, and secure development. […]

Cisco Umbrella for Government delivers advanced, cloud-native cybersecurity, ensuring protection and compliance for Federal, state, and local government agencies to support their mission. It significantly uplevels government cybersecurity, offering comprehensive protection that meets the unique needs and compliance requirements of government organizations and others that depend upon FedRAMP. […]

Because Elasticsearch was built on an open, flexible foundation, there are countless ways that organizations are using Elastic technology to meet their goals. Some of the most interesting Elasticsearch use cases come from government, education, healthcare, and defense organizations that are implementing Elasticsearch to better serve the public. […]

Public sector organizations continue to be prime targets for cyber crime, given their responsibility for highly sensitive data, such as health records, intelligence information, student data, and citizen IDs. […]

Why are we talking about metadata? Why now? Because metadata has fairly obvious limitations that are being overlooked. The problem isn’t that we create or use metadata — it is the way it is used that causes trouble. […]

MeriTalk recently sat down with Roger Colón, senior director of cybersecurity, and Gina Bornarth, senior manager of growth at Maximus, to explore vulnerability management policy and practices across the Federal government and how continuous vulnerability management can help agencies achieve “secure by design” cyber resiliency. […]

To understand the state of identity governance and administration among Federal agencies and opportunities to modernize, MeriTalk and SailPoint collaborated to produce, “Government identity security: Insight on how to accelerate your modernization.” […]

Increasingly, security and risk management personnel are implementing various initiatives centered on the concept of Zero Trust, whether because of regulatory guidelines, CISO guidance, or both. […]

The Department of Homeland Security (DHS) and Department of Justice (DOJ) maintain offices, stations, and field agents worldwide to address some of the most critical and urgent issues affecting national security. As law enforcement-focused agencies expand and evolve their data ecosystems, Federal investigators are becoming fluent in new investigative techniques and digital forensic tools. […]

MeriTalk, in partnership with Dell Technologies, Microsoft, and VMware, surveyed 100 IT decision-makers from the Federal government to understand how IT infrastructure modernization is driving the actionable outcomes that will define the next decade of Federal government operations and services. […]

View our FITARA Dashboard for an in-depth look at the gainers, the decliners, and everyone in between on the 16th installment of the FITARA Scorecard. […]

The democratization of information and the explosion of digital technologies have connected the world like never before, creating more efficient and collaborative ways of working for Federal agencies and all types of organizations. But this great opportunity comes with a great challenge: protecting networks and data from bad actors seeking to exploit ever-expanding cyberattack surfaces. […]

MeriTalk recently sat down with Essye Miller, former DoD deputy chief information officer for cybersecurity, former acting defense chief information officer, and board member for Axonius Federal Systems, and Tom Kennedy, vice president, Axonius Federal Systems, to talk about what successful public-private partnerships look like, lessons learned from past partnership experiences, and how industry and government can come together effectively to work towards common goals that advance the nation’s cybersecurity. […]

Explore how the DoD can enhance the user experience and deliver mission-critical data securely and to the right users at the speed of mission relevancy through data normalization in this issue brief from Maximus. […]

In this three-part program, we will assess the effects of the latest Federal strategy, mandates, and technical guidance on agency efforts to achieve zero trust, how an identity-first approach helps agencies design an efficient and effective zero trust defense, and what a comprehensive zero-trust solution looks like. […]

MeriTalk sat down with Erin Godinez, director, homeland security solutions, and Dean Irwin, senior director, cybersecurity, at Maximus, to discuss how the Department of Homeland Security is using technology to drive improvements that are rebuilding trust in government. […]

1 2 3 7