In a recent interview with MeriTalk, Peter Romness, the cybersecurity principal in the CISO Advisor’s Office at Cisco Systems, offered expert tips to agencies on how they can make faster progress – often with existing tools – in boosting cybersecurity and meeting the Federal mandates. […]

Learn how the Dell Technologies approach to zero trust brings together the expertise and end-to-end intelligent solutions to help Federal agencies simply, securely, and responsibly innovate and collaborate to deliver data-driven breakthrough experiences for your customers and your workforce, no matter where the mission takes them. […]

Download the issue brief, “Bring Fragmented Identity Ecosystems Together With a Federation Hub,” to learn how identity federation modernizes ICAM systems, enabling users in multiple organizations to access the same networks, applications, and resources. With identity federation, agencies can facilitate secure collaboration and meet Federal zero trust requirements. […]

This video and podcast will show how federated identity management and attribute-based access control can address authentication and authorization challenges and enable the right access, at the right time – in any environment. It will also explore how authorization policy scaling, device-level and identity vetting, and assurance-level signaling enable agencies to quickly adapt to threats. […]

In today’s fast paced world, the pursuit of excellence is a relentless journey. From the past eight State of the Software Supply Chain reports, we know that developer productivity soars when they have access to superior tools and better open source components, making them the driving force behind better security and better products. In this report, get an in-depth update on open source, and gain insights on the path to a more efficient, cost-eff­ective, and secure development. […]

Cisco Umbrella for Government delivers advanced, cloud-native cybersecurity, ensuring protection and compliance for Federal, state, and local government agencies to support their mission. It significantly uplevels government cybersecurity, offering comprehensive protection that meets the unique needs and compliance requirements of government organizations and others that depend upon FedRAMP. […]

Because Elasticsearch was built on an open, flexible foundation, there are countless ways that organizations are using Elastic technology to meet their goals. Some of the most interesting Elasticsearch use cases come from government, education, healthcare, and defense organizations that are implementing Elasticsearch to better serve the public. […]

Public sector organizations continue to be prime targets for cyber crime, given their responsibility for highly sensitive data, such as health records, intelligence information, student data, and citizen IDs. […]

Why are we talking about metadata? Why now? Because metadata has fairly obvious limitations that are being overlooked. The problem isn’t that we create or use metadata — it is the way it is used that causes trouble. […]

MeriTalk recently sat down with Roger Colón, senior director of cybersecurity, and Gina Bornarth, senior manager of growth at Maximus, to explore vulnerability management policy and practices across the Federal government and how continuous vulnerability management can help agencies achieve “secure by design” cyber resiliency. […]

Increasingly, security and risk management personnel are implementing various initiatives centered on the concept of Zero Trust, whether because of regulatory guidelines, CISO guidance, or both. […]

The Department of Homeland Security (DHS) and Department of Justice (DOJ) maintain offices, stations, and field agents worldwide to address some of the most critical and urgent issues affecting national security. As law enforcement-focused agencies expand and evolve their data ecosystems, Federal investigators are becoming fluent in new investigative techniques and digital forensic tools. […]

MeriTalk, in partnership with Dell Technologies, Microsoft, and VMware, surveyed 100 IT decision-makers from the Federal government to understand how IT infrastructure modernization is driving the actionable outcomes that will define the next decade of Federal government operations and services. […]

View our FITARA Dashboard for an in-depth look at the gainers, the decliners, and everyone in between on the 16th installment of the FITARA Scorecard. […]

The democratization of information and the explosion of digital technologies have connected the world like never before, creating more efficient and collaborative ways of working for Federal agencies and all types of organizations. But this great opportunity comes with a great challenge: protecting networks and data from bad actors seeking to exploit ever-expanding cyberattack surfaces. […]

MeriTalk recently sat down with Essye Miller, former DoD deputy chief information officer for cybersecurity, former acting defense chief information officer, and board member for Axonius Federal Systems, and Tom Kennedy, vice president, Axonius Federal Systems, to talk about what successful public-private partnerships look like, lessons learned from past partnership experiences, and how industry and government can come together effectively to work towards common goals that advance the nation’s cybersecurity. […]

Explore how the DoD can enhance the user experience and deliver mission-critical data securely and to the right users at the speed of mission relevancy through data normalization in this issue brief from Maximus. […]

In this three-part program, we will assess the effects of the latest Federal strategy, mandates, and technical guidance on agency efforts to achieve zero trust, how an identity-first approach helps agencies design an efficient and effective zero trust defense, and what a comprehensive zero-trust solution looks like. […]

MeriTalk sat down with Erin Godinez, director, homeland security solutions, and Dean Irwin, senior director, cybersecurity, at Maximus, to discuss how the Department of Homeland Security is using technology to drive improvements that are rebuilding trust in government. […]

See how Okta helps Government connect simply and securely to federal, state, and local agencies, and universities—on any device and platform. […]

Explore how industry leaders are bringing high assurance security into the enterprise and meeting today’s missions and tomorrow’s evolving needs. […]

Download the eBook to find insights on how Federal civilian and defense agencies, state and local governments, and higher education alike — all must provide a secure and seamless Identity experience for their external stakeholders. […]

The Human-Centered Design Challenge is designed to help you map out an identity framework that ensures every user can safely access your agency’s benefits and services without any hurdles. […]

Monitoring and protecting against cyber adversaries is no small feat – cybersecurity attacks often involve terabytes of historical data, most of which ends up being irrelevant. Read more about how one Federal law enforcement agency is working with Cribl and August Schell to simplify data and accelerate the outcome of cybersecurity investigations. […]

In this MeriTalking podcast, MeriTalk’s Joe Franco is joined by Matt Lembright, director of Federal applications at Censys, which maintains a comprehensive internet map used for threat hunting. […]

Digital transformation is accelerating across the Federal government, spanning efforts to create efficiencies, improve the customer experience, empower the Federal workforce, and much more. The $1.2 trillion Infrastructure Investment and Jobs Act directly addressed the need for digital transformation in architecture, engineering, and construction (AEC). […]

In this post, we explore the key elements of CISA’s recommendations for zero trust and how SentineOne’s AI-powered XDR platform empowers enterprises to meet the challenge of embracing zero trust in today’s digital landscape. […]

Explore the steps to protect data from the network to the edge with zero trust principles to achieve full zero trust maturity in your agency. […]

In this Federal Feature and Q&A, learn how individual agencies have used the TMF to their advantage to better protect their systems and how IT modernization has helped create new opportunities for technology leaders. […]

Okta provides a secure pathway between Login.gov and digital service delivery. That pathway accelerates agencies’ adoption of shared digital infrastructure, enables developers to build and connect apps more simply, and provides choice and convenience in how the American public interacts with the government. […]

1 2 3 6