An unclassified summary of DOD’s new cyber strategy offers few specifics as it outlines plans to protect the industrial base and improve technology used in cyber defense.
The government’s federal chief information security officer shares progress update on where agencies stand on implementing phishing-resistant multifactor authentication, endpoint detection and response, and cultural changes to improve cyber posture.
A new program at the National Science Foundation is asking the question, what happens when algorithm graduate from training data to real world data that continues to expand and grow? Will the results remain as accurate?
Can your agency get access to cyber tools quickly? Yes, says AWS’ Jim Helou. It’s one of the benefits of the cyber partnerships available through Marketplace: providing agencies access to combinations of tools needed for zero trust — on a compressed timeline.
Yes, zero trust is a journey. But it also requires being holistic in your approach, recommends CrowdStrike’s Andrew Harris. He shares this plus three other tips for success in implementing zero trust with The Federal Drive’s Tom Temin.
Maybe Hansang Bae once worked at Nike. When he’s taking about zero trust, he’s so passionate that you expect at any moment he’s going to say, “Just do it.” What he definitely did say was: “My advice is to get going. The technology is mature enough.”
Zero-trust architecture has been top-of-mind for the federal government, especially as we approach the one-year countdown for the White House’s zero-trust memorandum deadline.
Getting rid of passwords once and for all is really about creating strong security that’s also frictionless for users, explains Okta’s Sean Frazier in a conversation with Federal News Network’s Jason Miller. What will that take?