Agencies understand the importance of the disparate zero trust controls and requirements separately, but they struggle with figuring out how to move forward with all of them. Here’s how they can do that.
The Army is getting closer to fulfilling its ambitions to deliver cloud services to the tactical edge following a pilot test delivering edge computing to Guam, which Army CIO Raj Iyer described as a “grand success.” Find out what’s next.
Federal News Network sat down with two industry technology experts to get their take: Tony Celeste, executive director and general manager for public sector at Ingram Micro, and Cameron Chehreh, vice president and general manager for public sector worldwide at Intel.
Find out why Leidos’ Kim Denver, who spent two-thirds of his career in Army contracting roles, likes to say most contract decisions are made in “Middle-earth.” We talk to Denver for our Leading Voices in Federal Contract Management series.
This week’s FEDtalk show features attorneys from the law firm of Shaw Bransford & Roth (SBR) to discuss personnel issues and trends emerging from the pandemic era.
: Federal oversight offices are recognizing that compliance does not equal effectiveness when it comes to cybersecurity. A new group of inspector general officials is considering how they can help agencies implement new approaches like zero trust security architectures.
CGSI’s mission is to support agencies with professional services. It helps agencies design and manage their networks so that they can focus on their missions.
It's been a year since the rollout of the administration's cybersecurity executive order. How has it progressed across the federal enterprise over the past year?
Leveraging a public-private partnership is the first, most practical step an agency can take when it’s looking to transform its networks. Industry partners provide vital support in staffing, training, and the latest technologies.
A shift from paper to electronic records is underscoring the need for agencies to implement a broader digitization strategy.
Given the technical nature of much zero trust guidance, it can be tough to see the big picture. As part of our Zero Trust Cyber Exchange, Juniper Network’s Tom Van Meter offers insights to help agencies make the shift.
Increasingly, agencies’ core missions require bringing in information, exchanging information or providing information. That requires creating excellent customer experiences. A CX expert shares how to make those engagements seamless.
When the network is no longer the boundary for managing secure access to an organization’s data, what is the perimeter? It’s context, said Sean Frazier, federal chief security officer at Okta. And that context —…
There are certain strategies, features and frameworks that agencies can adopt that will get them closer to zero trust. One of the most effective is the service mesh architecture.
Before agencies buy any new technology for their zero trust efforts, they should establish a discrete program and staff it fully, advises the FDIC’s Stephen Haselhorst. We talked to him about doing just that during the Zero Trust Cyber Exchange.