data sharing

MeriTalk recently connected with Cisco’s Will Ash, Senior Director of Security Sales, and Peter Romness, Cybersecurity Solutions Lead, U.S. Public Sector CTO Office, on the current cyber threat landscape, how Zero Trust plays into agencies’ evolving cyber defense plans, and the importance of public-private sector collaboration. […]

The present and future state of Federal IT has monumental challenges to address – modernization, data utilization, and automation just to name a few – but none are so critical, or enduring, as cybersecurity. It’s the threat that will never fully go away – and where eternal vigilance, and innovation, are the price of liberty. […]

NASA

The National Aeronautics and Space Administration (NASA) is looking to implement a zero-trust architecture, and increase cloud adoption, as the agency looks to the recompete of its NASA Integrated Communications Services (NICS) contract, a December 11 request for information notes. […]

Cyber Security Brainstorm

Through the adoption of modern security technologies, Federal agencies are adopting security solutions that map to a Zero Trust architecture, even if the agency isn’t yet ready to pursue a full Zero Trust model, according to new research from MeriTalk. […]

Cybersecurity cyber

The National Institute of Standards and Technology (NIST), in collaboration with the Federal CIO Council’s architecture subgroup, released a draft report on zero-trust architectures and the use cases and deployment models where zero-trust can improve cybersecurity. […]

Cybersecurity cyber

By: Lisa Lorenzin, Director of Emerging Technology Solutions for the Americas, Zscaler Federal CIOs will be working harder than ever to deploy cloud applications and infrastructure over the next year as they work to meet 2020 Data Center Optimization Initiative (DCOI) deadlines, continue to deploy shared services, and work to meet evolving mission requirements. The […]

ICAM

The identity, credential, and access management policy recently released by the Office of Management and Budget (OMB) mostly keeps existing policy in place, but sets a framework for faster policy evolutions and acknowledges the need for protections within the perimeter, said Sean Frazier, advisory CISO at Duo Security. […]

While few can pronounce the Air Force CTO’s name – zero can spell it – which leads us in nicely to Frank Konieczny’s presentation on Zero Trust at Akamai’s event on Tuesday, April 30, “Zero Trust: Moving Beyond Perimeter Security.” […]

Cyber Security Brainstorm

A new report from ACT-IAC (American Council for Technology-Industry Advisory Council) finds that zero-trust technologies are available and lend themselves to incremental installation, but need support from the mission side of the agency for effective implementation. […]

Boosting the use of cloud services may be the answer to expanding implementation of zero-trust models of cybersecurity across Federal agencies and departments, Education Department CISO Steven Hernandez said at an ACT-IAC meeting today. […]

cloud cyber modernization AI

Federal Deputy CIO Margie Graves said today that the forthcoming update to the Trusted Internet Connections (TIC) Initiative is coming “extraordinarily soon.” With the update, there seems to be an acknowledgment that the former ways of TIC–now over a decade old–will be yielding, including the TIC architecture often seen as expensive and inflexible to cloud technologies. […]

Zscaler announced today that its Zscaler Private Access-Government (ZPA-Government) application access platform received FedRAMP Moderate certification to sell across government. ZPA-Government, which received authority to operate by the Federal Communications Commission (FCC), is the first FedRAMP-approved zero trust remote access platform. […]

Paul Beckman, chief information security officer at the Department of Homeland Security, said Thursday at MeriTalk’s Cyber Security Brainstorm that software-defined networking, adopting a zero-trust model, and optimizing DHS’ security operations centers (SOC) are his biggest emerging priorities to promote better security across the department. […]

1 7 8 9

Categories