category >> zero-trust
-
EDUCAUSE 2022: Uniting IT and Education
January 6th, 2023
Through the inclusion and modernization of technology, education institutions can reach new heights in their accessibility and connection with students.
- Tagged Cybersecurity, EDU, Education, Education Technology, EDUCAUSE, Higher Education, K-12 Education, Multicloud, Tradeshows, Zero Trust
-
3 Ways to Address Developers’ Productivity Concerns
January 5th, 2023
Dig into some of the biggest productivity challenges—and what you, as a government IT professional, can do to address them.
- Tagged Cybersecurity, Developer Productivity, Government IT, Government Productivity Challenges, Mattermost, workflow automation, Zero Trust
-
Headlines in Cybersecurity—Ransomware, Supply Chain Hack and Zero Trust
December 27th, 2022
At Geek Week, thought-leaders from the government and contracting community focused on ransomware, supply chain hacks and zero trust within the cyber threat environment and ways to respond and protect their most valuable assets, data and IT systems, more effectively.
- Tagged 3D Survey, Cyber Geek Week, Cybersecurity, Cybersecurity Solutions, SBOM, Software Bill of Materials, Supply Chain Attack, Zero Trust, Zero Trust Architecture
-
A New Era in Government Cybersecurity
November 4th, 2022
Learn how agencies can continue to evolve cybersecurity architecture and strategy, given the increased attack rate and creativity of malicious actor.
- Tagged AvePoint, Cribl, FCW, Government Identity, IIG, Innovation in Government, okta, SentinelOne, Splunk, Thales TCT
-
3 Strategies for Effectively Enforcing the Principle of Least Privilege
October 20th, 2022
Explore how with the Principle of Least Privilege, users are granted access to the tools, technologies, and data they need to do their jobs and no more.
- Tagged Data Access, Federal Government, Principle of Least Privilege, SolarWinds, User Privilege, Zero Trust
-
The “Sixth Pillar” of the Zero Trust Maturity Model
September 21st, 2022
Organizations can define sensitive data and utilize the “sixth pillar” by implementing workspaces without overworking IT teams, enhancing their zero trust.
- Tagged AvePoint, CISA, Collaboration, Cybersecurity and Infrastructure Security Agency, Data Protection, Federal News Network, FNN, Security, Workplace Collaboration, Zero Trust, Zero Trust Maturity Model
-
The Best of What’s New in Cybersecurity
June 21st, 2022
Learn the latest trends in cybersecurity for state and local government from these thought leaders and additional industry research from GovTech.
- Tagged Box, Cybersecurity, GovTech, Hewlett Packard Enterprise, HPE, IIG, Innovation in Government, Keeper Security, SLG, SolarWinds, State and Local Government
-
Accelerating Digital Transformation
June 6th, 2022
Digital transformation remains of the most imperative ongoing technology modernization to improve government performance. Learn more from these thought leaders and additional industry research.
- Tagged 5G, Dell, Digital Transformation, FCW, Government Modernization, IIG, Innovation in Government, Multicloud, Zero Trust
-
Strengthening Operational Technology with Zero Trust
June 2nd, 2022
Zero Trust is the industry's leading cybersecurity architecture. In correspondence with operational technology, this strategy is most vital for cyber attack prevention.