All Roads Lead to Federal Zero Trust

Over the last few years, the federal government has begun to embrace a zero trust approach as the new cybersecurity standard for agencies. Utilizing the latest solutions and best practices, the hope is to bolster federal cybersecurity and create a…

Microsoft’s Federal Security CTO on the impact of OMB’s zero trust strategy

Last January, the Office of Management and Budget (OMB) released M-22-09, a memorandum that set forth the federal government strategy on zero trust adoption, in an effort to reinforce the security and protection of government agencies’ critical systems, networks, and…

Bolstering Multi-Cloud Security with Identity Management

As organizations adapt to hybrid work and more and more cloud services are deployed, new service entities that collaborate and exchange data without human interaction, such as virtual machines and containers, are proliferating. The growth of these service accounts and…

New Year, New Breaches—Three modern identity attacks insights to know going into 2022

The beginning of a New Year is always a strangely quiet time for government agencies. The holidays have just ended, agency employees are slowly trickling back into work and settling back into their home offices, to sign in and begin…

Four added benefits of identity and access management

The global, dynamic, and interconnected nature of IT enterprises today – and a proliferation of security threats – require protections that limit the damage attackers can do once they’re inside the agency firewall. Knowing that cybersecurity threats are only increasing…

Solid foundations + innovation = stout cybersecurity

Every security professional knows that the adversary has the advantage. We have to find every vulnerability and remediate it, and the enemy only needs to find one vulnerability and exploit it. This asymmetry underlies their economic advantage: finding one vulnerability…

Why multi-factor authentication is essential for IAM

Identity and Access Management (IAM) is the art and science of ensuring that someone is who they say claim to be. This ensures that they have the correct level of access to systems and data – enough to do their…