Tom Kennedy, Axonius

Tom Kennedy, vice president of Axonius Federal Systems, said on April 16 that the company expects to receive FedRAMP (Federal Risk and Authorization Management Program) authorization for its hosted service offering for the Federal government in the near term. […]

cybersecurity

This is the third in a three-part discussion about cyber asset inventories with Tom Kennedy, vice president of Axonius Federal Systems. Part one explored the role that cyber asset inventories play in establishing a zero trust approach to cybersecurity, and part two examined Federal government requirements for reliable asset inventories and their many benefits. Part three addresses the emerging need for cyber asset attack surface management and how agencies can best meet that need. […]

Cyber

This is the second in a three-part discussion about cyber asset inventories with Tom Kennedy, vice president of Axonius Federal Systems. In the previous interview, Kennedy spoke to MeriTalk about the role that cyber asset inventories play in establishing a zero trust approach to cybersecurity. Part two examines Federal government requirements for reliable asset inventories and their many benefits. […]

“You can’t secure what you can’t see” is a common refrain in cybersecurity circles. It’s echoed in multiple Federal IT mandates, including the zero trust strategy and the event logging memo from the Office of Management and Budget. Gaining comprehensive visibility across agency networks, devices, applications, and identities is no mean feat in today’s diverse and ever-changing IT environments. […]

Government IT leaders may feel a little punch drunk lately. Between new mandates, an understaffed workforce, and aging systems–they are getting hit from all angles. Indeed, Chad Sheridan, CIO for USDA’s Risk Management Agency kicked off his keynote at last Thursday’s Veritas Public Sector Vision Day in Washington, D.C. by quoting Mike Tyson: “Everybody has a plan until they get punched in the mouth.” […]

Categories