Watch: Cyber Challenge in Focus Listen: Data Noise to Cyber Advantage Cyberattacks, connected devices, and data are growing exponentially every year, into the billions, trillions, and zettabytes, respectively. Neither people nor traditional cybersecurity solutions can keep up with the data or the attacks. In this episode of MeriTalking, Gail Emery speaks with NVIDIA’s […]
See how policy and technology are coming together to beat back bad actors — and how the next-generation cybersecurity workforce is tapping into innovation and automation — driving towards greater security resiliency that is needed to withstand unpredictable threats and emerge stronger.
Seamless, intuitive, and time-saving digital services require both modern applications and modern identity and access management. Learn how a modern identity approach enables application modernization and why identity modernization is simpler than ever.
Learn how the military’s focus on identity will help it defend against increasingly sophisticated cyberattacks and why secure identity platforms have become critical infrastructure in the digital age.
Learn how Quest technology provides agencies with the ability to fully understand the legacy systems in their environments, as well as solutions to aid in at-scale migrations. Ensuring agencies effectively leverage the tools at their disposal to keep data secure.
What do the memo’s requirements mean for Federal agencies? How can they best implement zero trust? What exactly is “phishing-resistant MFA”? MeriTalk sat down with Bryan Rosensteel, U.S. Federal CTO at Ping Identity, to get the answers to these questions and learn how agencies can best institute zero trust.
The unsettling reality of cyber threats is that an attack could happen at any time without your knowledge. And with attacks increasing in number and in intensity, it has never been more vital to stay proactive with your security strategy.
A cyber risk profile helps Federal agencies organize a comprehensive approach to intelligent data management – not just a disaster recovery strategy. Learn how a cyber risk profile helps agencies not only identify vulnerabilities, but also prioritize the operational systems that require the greatest protection and the systems that are the highest priority for restoration. These efforts are the foundation of a cyber readiness plan.
No matter the complexity of your environment or where you are on your IT modernization journey, an IT operations automation strategy can help you improve existing processes. With automation, you can save time, increase quality, improve employee satisfaction, and reduce costs throughout your organization.
In the report, we will explore data findings gleaned through review of more than 13 billion authentications from almost 50 million different devices across our customer base in North America, Latin America, Europe, Middle East, and the Asia Pacific, over the course of a year.
Learn how agencies must now apply processes and procedures to improve asset and visibility discovery for the purposes of reducing cybersecurity risk and vulnerability remediation. The BOD provides examples of visibility approaches and emphasizes that asset visibility “is necessary for updates, configuration management, and other security and lifecycle management activities” that help agencies achieve stated goals.
In all corners of the tech world, cutting-edge research is thriving, and emerging technologies are supporting mission-critical work. Cybersecurity pioneers are implementing zero trust principles to help keep the nation safe from cyber threats, while artificial intelligence (AI) is a growing presence in Federal agencies.
Today, everyone is talking about resilience, but achieving it can seem easier said than done. Security is an essential component of this missioncritical capability. In a recent interview with MeriTalk, Andy Stewart, senior national security and government strategist at Cisco, broke down security resilience into five dimensions.
Tune in to the “Benefits of CHVP Extending Use for High Assurance Security” webinar for an in-depth discussion between General Dynamics Mission Systems’ Chris Barnicle, TACLANE Program Manager, and Ken Ottaviano, Solution Architect, as they explore encryption solutions categorized as cryptographic high-value product (CVHP) and review the differences between High Assurance Type 1 and CSfC solutions.
Logging underpins all cyber defense. Without effective logging, agencies struggle to detect incursions, run analytics on events, and understand incidents. Fortunately, agencies don’t have to start from scratch as they pursue an enterprise-wide view of their logging coverage.
To provide a robust cyber defense, agencies need better visibility into networks, improved event logging, and comprehensive observability. Not coincidentally, these are all essential steps to establishing a zero trust approach.
MeriTalk sat down with Tony Holmes, Practice Lead for Public Sector Solutions Architects at Pluralsight, a technology workforce development company, to discover how agencies can use learning to address skill gaps and provide career opportunities to employees.
By becoming a true Zero Trust Enterprise, departments and agencies will enjoy greater cyber resilience through consistent, improved and simplified security operations, keeping data safe while complying with government mandates.
As ransomware actors are increasingly targeting data backups, an effective defense-in-depth strategy continues to be necessary but is no longer sufficient. Learn more about Commvault’s ‘Ready, Steady, Respond’ approach, and how recovery readiness is a core value for Commvault in designing and delivering its intelligent data management portfolio.
Private-sector tech experts from Databricks, Software AG, and Quest Software offered up a list of scorecard category and structural policy improvements that they believe will help Federal agencies speed progress toward better cybersecurity and IT efficiency.
MeriTalk sat down with James Bench, Senior Principal at Maximus, and John Mandell, Managing Director of the National Security Practice at Maximus to learn how technology can give Federal agencies – particularly those with a national security focus – a customer service edge.
Read the Palo Alto Networks brief to learn how Federal agencies can move from implicit trust to Zero Trust and deploy consistent security capabilities across users, applications, and infrastructure – on premises, in the data center, and in cloud environments.
Learn how monitoring and data analytics can help law enforcement proactively use intelligence to thwart criminals and terrorists, in this Executive Survey featuring Recorded Future’s Levi Gundert.
In response to these rapidly evolving challenges, DoD and IC IT teams have turned to the NSA’s Commercial Solutions for Classified (CSfC) strategy to transform the delivery of their cybersecurity solutions. The CSfC program leverages industry innovation allowing agencies to protect classified information and other high-value resources against well-funded, sophisticated attackers. This article shares best practices and lessons learned from agencies that have successfully safeguarded critical remote endpoints by implementing CSfC solutions and remote access to classified networks.