Archived Events
Moving away from inefficient legacy cybersecurity solutions and practices is critical to helping colleges and universities stop student financial aid and identity fraud.Applicant's identities are rarely verified, which can result in colleges and universities issuing funds to bad actors instead of students. What ...
Zero trust is vital for our nation’s cybersecurity modernization, as reinforced by Executive Order 14028. To accelerate adoption, CISA drafted a simple Maturity Model that provides five pillars of zero trust: Identity, Device, Network, Workload, and Data. Even with a simple model to follow, a zero trust journey can be long ...
Identity takes center stage as zero trust implementations grow. Identity has been key to individual access to information for some time in government, but it has often been based on physical access cards. As the federal government now begins a move to accommodate more mobile devices in non-traditional environments, agencies ...