View our FITARA Dashboard for an in-depth look at the gainers, the decliners, and everyone in between on the 16th installment of the FITARA Scorecard. […]
The democratization of information and the explosion of digital technologies have connected the world like never before, creating more efficient and collaborative ways of working for Federal agencies and all types of organizations. But this great opportunity comes with a great challenge: protecting networks and data from bad actors seeking to exploit ever-expanding cyberattack surfaces. […]
MeriTalk recently sat down with Essye Miller, former DoD deputy chief information officer for cybersecurity, former acting defense chief information officer, and board member for Axonius Federal Systems, and Tom Kennedy, vice president, Axonius Federal Systems, to talk about what successful public-private partnerships look like, lessons learned from past partnership experiences, and how industry and government can come together effectively to work towards common goals that advance the nation’s cybersecurity. […]
Explore how the DoD can enhance the user experience and deliver mission-critical data securely and to the right users at the speed of mission relevancy through data normalization in this issue brief from Maximus. […]
In this three-part program, we will assess the effects of the latest Federal strategy, mandates, and technical guidance on agency efforts to achieve zero trust, how an identity-first approach helps agencies design an efficient and effective zero trust defense, and what a comprehensive zero-trust solution looks like. […]
MeriTalk sat down with Erin Godinez, director, homeland security solutions, and Dean Irwin, senior director, cybersecurity, at Maximus, to discuss how the Department of Homeland Security is using technology to drive improvements that are rebuilding trust in government. […]
See how Okta helps Government connect simply and securely to federal, state, and local agencies, and universities—on any device and platform. […]
Explore how industry leaders are bringing high assurance security into the enterprise and meeting today’s missions and tomorrow’s evolving needs. […]
Download the eBook to find insights on how Federal civilian and defense agencies, state and local governments, and higher education alike — all must provide a secure and seamless Identity experience for their external stakeholders. […]
The Human-Centered Design Challenge is designed to help you map out an identity framework that ensures every user can safely access your agency’s benefits and services without any hurdles. […]
Monitoring and protecting against cyber adversaries is no small feat – cybersecurity attacks often involve terabytes of historical data, most of which ends up being irrelevant. Read more about how one Federal law enforcement agency is working with Cribl and August Schell to simplify data and accelerate the outcome of cybersecurity investigations. […]
In this MeriTalking podcast, MeriTalk’s Joe Franco is joined by Matt Lembright, director of Federal applications at Censys, which maintains a comprehensive internet map used for threat hunting. […]
Digital transformation is accelerating across the Federal government, spanning efforts to create efficiencies, improve the customer experience, empower the Federal workforce, and much more. The $1.2 trillion Infrastructure Investment and Jobs Act directly addressed the need for digital transformation in architecture, engineering, and construction (AEC). […]
In this post, we explore the key elements of CISA’s recommendations for zero trust and how SentineOne’s AI-powered XDR platform empowers enterprises to meet the challenge of embracing zero trust in today’s digital landscape. […]
Explore the steps to protect data from the network to the edge with zero trust principles to achieve full zero trust maturity in your agency. […]
In this Federal Feature and Q&A, learn how individual agencies have used the TMF to their advantage to better protect their systems and how IT modernization has helped create new opportunities for technology leaders. […]
Okta provides a secure pathway between Login.gov and digital service delivery. That pathway accelerates agencies’ adoption of shared digital infrastructure, enables developers to build and connect apps more simply, and provides choice and convenience in how the American public interacts with the government. […]
Make it a priority to educate yourself on the latest threat vectors and implement robust security solutions that take a comprehensive platform approach to identify and eliminate threats in real time before they can compromise your environment. Download the report to learn how to always stay one step ahead of security threats and the attackers who are perpetrating them. […]
TikTok is banned from Federal agency devices. Lookout’s Kristina Balaam and Frank Johnson evaluate the Federal ban, how IT teams can identify risky apps, and why governments should be concerned about more than TikTok. […]
To achieve success with zero trust, experts recommend a comprehensive, integrated approach to protect users and their devices against stolen credentials, phishing, and other identity-based attacks; secure hybrid, multicloud workloads; and identify and act on cyber threats. Download the report to learn more. […]
Discover the full benefits of the metaverse and how the technology is bringing Federal teams together, simplifying IT challenges, and solving complex problems in real time. […]
This video session will examine the importance of a solid cybersecurity evolution roadmap, dive deep into why it is critical, and provide advice on implementation. We’ll also explore the role of zero trust architecture within a digital transformation journey. […]
Growing awareness of cyber asset attack surface management comes as Federal agencies work to implement the Biden administration’s May 2021 cybersecurity executive order and the subsequent zero trust strategy issued by the Office of Management and Budget. Federal officials said recently that while notable progress has been made, the cybersecurity effort still has a long way to go. Download the resource to learn how to stay ahead of threat actors and get a more accurate view of what is within your IT environment. […]
Learn how to defend networks against persistent and dynamic threats, and protect the nation’s most critical information throughout the cyber ecosystem across land, air, sea and space. […]
In this issue brief, learn how Fortinet Federal can help agencies enhance their IT capabilities as they modernize for greater agility, resiliency, efficiency, and security. […]
With the myriad of cybersecurity challenges the Federal government faces every day, how can agencies keep up with transitioning to the cloud securely, ensuring consistent security measures, minimizing attack surfaces, and maintaining a skilled workforce? […]
Privileged access management (PAM) serves as the gateway towards securing data in any organization. Just like a gateway, it must be holistically secured, preferably with multiple lines of defense. In this eBook, learn the top fivereasons why all organizations, including government agencies need to adopt PAM to secure their assets. […]
Censys recently uncovered a Russian ransomware group within its internet search data by identifying suspicious hosts and leveraging historical analysis and technical pivots. The journey began with open source hacking tools and ended with ransomware packages, a removed IOC, and two Bitcoin hosts for payment. Read the report to see why investigators don’t have to wait for enemies to be knocking on the door to find them in the wild. […]
The government has prioritized endpoint detection and response (EDR) tools in various cybersecurity directives, but EDR alone will not curtail ransomware. […]
The way forward to the zero trust future is a defined and unified security policy that embraces artificial intelligence, automation, and orchestration. The Cortex suite of products from Palo Alto Networks can help keep Federal agencies safe from attack by delivering leading endpoint protection and enterprise-wide threat detection and response across network, cloud, endpoint, and virtually any data source. Learn how your agency can monitor the security landscape and get the intelligence you need to respond before a breach can occur. […]