Tune in to the “Benefits of CHVP Extending Use for High Assurance Security” webinar for an in-depth discussion between General Dynamics Mission Systems’ Chris Barnicle, TACLANE Program Manager, and Ken Ottaviano, Solution Architect, as they explore encryption solutions categorized as cryptographic high-value product (CVHP) and review the differences between High Assurance Type 1 and CSfC solutions.

[…]

Logging underpins all cyber defense. Without effective logging, agencies struggle to detect incursions, run analytics on events, and understand incidents. Fortunately, agencies don’t have to start from scratch as they pursue an enterprise-wide view of their logging coverage.

[…]

To provide a robust cyber defense, agencies need better visibility into networks, improved event logging, and comprehensive observability. Not coincidentally, these are all essential steps to establishing a zero trust approach.

[…]

MeriTalk sat down with Tony Holmes, Practice Lead for Public Sector Solutions Architects at Pluralsight, a technology workforce development company, to discover how agencies can use learning to address skill gaps and provide career opportunities to employees.

[…]

By becoming a true Zero Trust Enterprise, departments and agencies will enjoy greater cyber resilience through consistent, improved and simplified security operations, keeping data safe while complying with government mandates.

[…]

As ransomware actors are increasingly targeting data backups, an effective defense-in-depth strategy continues to be necessary but is no longer sufficient. Learn more about Commvault’s ‘Ready, Steady, Respond’ approach, and how recovery readiness is a core value for Commvault in designing and delivering its intelligent data management portfolio.

[…]

Private-sector tech experts from Databricks, Software AG, and Quest Software offered up a list of scorecard category and structural policy improvements that they believe will help Federal agencies speed progress toward better cybersecurity and IT efficiency.

[…]

MeriTalk sat down with James Bench, Senior Principal at Maximus, and John Mandell, Managing Director of the National Security Practice at Maximus to learn how technology can give Federal agencies – particularly those with a national security focus – a customer service edge.

[…]

Read the Palo Alto Networks brief to learn how Federal agencies can move from implicit trust to Zero Trust and deploy consistent security capabilities across users, applications, and infrastructure – on premises, in the data center, and in cloud environments.

[…]

Learn how monitoring and data analytics can help law enforcement proactively use intelligence to thwart criminals and terrorists, in this Executive Survey featuring Recorded Future’s Levi Gundert.

[…]

View our FITARA Dashboard for an in-depth look at the gainers, the decliners, and everyone in between on the 14th installment of the FITARA Scorecard.

[…]

MeriTalk spoke with Frank Dimina, senior vice president of Americas and public sector at Splunk, about the value of log data and how agencies can facilitate collection and analysis.

[…]

In response to these rapidly evolving challenges, DoD and IC IT teams have turned to the NSA’s Commercial Solutions for Classified (CSfC) strategy to transform the delivery of their cybersecurity solutions. The CSfC program leverages industry innovation allowing agencies to protect classified information and other high-value resources against well-funded, sophisticated attackers. This article shares best practices and lessons learned from agencies that have successfully safeguarded critical remote endpoints by implementing CSfC solutions and remote access to classified networks.

[…]

Read the Ping Identity Solutions Brief to learn how to enable federated authentication to cloud, on-premise, legacy, and air-gapped applications without any code customizations for deployment.

[…]

MeriTalk recently sat down with Zane Bond, director of product management at Keeper Security, to discuss how user experience plays a role in cybersecurity and can help reduce mistakes that lead to security breaches.

[…]

Current defense strategies are not working. Defenders must switch to offense. Organizations must move to intelligence-led security programs that anticipate adversaries and their intent, monitor the infrastructure they build, and learn from breached organizations.

[…]

Tune in to the “Choosing the Right Data Center Security Solution” webinar for an in-depth discussion between General Dynamics Mission Systems’ cyber systems product development director, Ryan Tomasetti, and solutions architect, Michael Corcoran on the security requirements and considerations for high-speed enterprise backbones and how each consideration impacts mission applications.

[…]

While it can be a bit overwhelming to address all the angles necessary to truly secure agency networks, there is really no choice. One way to simplify it is to bring it back to basics—zero trust, for everything from data, APIs, nodes and ports to users.

[…]

This white paper will explain the importance of a zero-trust mindset with an emphasis on understanding your full attack surface, including the numerous web applications that exist and are being developed for increasingly digital operations.

[…]

In this segment of “Defining Moments” on MeriTV, we examine how agencies can keep data actionable within the framework of the Executive Order with John Harmon, regional vice president of cyber solutions at Elastic.

[…]

MeriTalk recently sat down with Fortinet and Fortinet Federal leaders to gain insights into how Federal technology teams can integrate all of the components of a zero trust architecture to achieve holistic cybersecurity in a cloud, hybrid, or closed environment.

[…]

Download the white paper to see how we dive into the human condition in the Federal environment in order to understand how and why managing insider threats is so important to the well-being of Federal systems and networks, and the protection of sensitive information contained in those systems and networks.

[…]

MeriTalk, in partnership with Recorded Future, explored identity authentication challenges and how Federal agencies can advance towards an intelligence-driven approach.

[…]

Download the PDF to read how Federal agencies can adopt zero trust across their hybrid environments with Fortinet. Fortinet’s platform enables agencies to implement and connect best-of-breed solutions from multiple vendors, approach technology updates incrementally, manage cybersecurity from a centralized dashboard, provide employees a seamless yet secure user experience, and more.

[…]

MeriTalk sat down with Justin Wilkins, director of sales engineering, public sector, Varonis, to understand how agencies can implement a data-first approach to zero trust.

[…]

MeriTalk sat down with Joe Kehoe, vice president of the Department of Defense (DoD) practice at Maximus, to learn how his company approaches agency engagements and leverages emerging technologies to modernize agency systems – with the goal of providing the best experience for his customers’ customers: American citizens.

[…]

As the nature of warfighting evolves, the need for technology solutions that put the right information in the right hands, at the right time, has never been greater.

[…]

As agencies come to grips with the understanding that their previous approach to mainframe security was lacking, the next step is pivoting multiple points in their strategy to remedy the issue.

[…]

In 2021, MeriTalk, in partnership with MFGS, Inc., surveyed 150 Federal cybersecurity leaders to explore security automation efforts and opportunities to improve cyber defense. 98% of which see gaps in their agency’s cybersecurity strategy. A large majority of these leaders say their agency is not using security automation with a significant impact. Learn about the gaps in agency’s current cybersecurity strategy currently and the priorities over the next three years.

[…]

In 2021, Meritalk, in partnership with MFGS, Inc., surveyed 153 Federal cybersecurity leaders to explore how agencies are employing application security (AppSec). A large majority of leaders have implemented some form of application security and have already seen significant benefits. However, most of these leaders also still see gaps in their organization’s security. Take a look at implementation now and over the next three years to learn what’s most important to agencies.

[…]

1 2 3 4