What federal government security architects need to know about zero trust

For the federal government, a zero trust architecture assumes that all traffic on an agency’s internal network is potentially malicious. Consequently, it requires taking measures to: Authenticate all connections Identify all devices, users, applications, and services Ensure that traffic goes…

Federal government looks to bolster cybersecurity infrastructures due to heightened security threats

This article originally appeared on the official DLT Solutions blog. The heightened threat of retaliatory cyberattacks by Russia against critical U.S. IT infrastructure is prompting federal investments in cybersecurity to strengthen its cyber defense posture. The ongoing conflict in the…

CISA NRMC AD shares five steps for getting our nation’s cyber risk under control

Recently, CrowdStrike held its annual Fal.Con for Public Sector Conference, which brings together leaders and decision-makers from across the public sector, education, and industry to discuss protecting and managing government data and networks. The Fal.Con for Public Sector Conference featured…

Asset Management Takes Center Stage as Government Moves to Secure Agency Networks

Earlier this month, President Biden signed a cybersecurity-focused executive order designed to put federal agencies on a path toward securing their networks and data. The executive order also aims to increase information sharing between the public and private sectors, and…

Four Reasons Why Hackers Are Targeting Schools During COVID

This article is part of a longer piece that was originally published on the NETSCOUT blog. Click HERE to read the original article in its entirety. We already know that cybercriminals have seized on the global COVID-19 pandemic as a…

Why AppSec is Essential for Today’s Software-Enabled Government

Software flaws remain some of the most exploited vulnerabilities by hackers and malicious actors. In fact, Forrester reports that vulnerable software and applications are the top cause of data breaches. Today, software is playing an increasingly mission-critical role across the…