Unit 42 brings together world-renowned threat researchers with an elite team of security consultants to create an intelligence-driven, response-ready organization.
During this webinar, you will learn how to, Establish the criteria for defining an agency's most sensitive and valuable data, Delineate elements of the network, including third-party access, to be addressed in a zero trust architecture, Define the role of strong identity management and its role in zero trust, Identify all applications used by the networks for continuous monitoring
During this webinar, you will learn how to, Establish the criteria for defining an agency's most sensitive and valuable data, Delineate elements of the network, including third-party access, to be addressed in a zero trust architecture, Define the role of strong identity management and its role in zero trust, Identify all applications used by the networks for continuous monitoring
Adopting a Zero Trust architecture is certainly not a new concept, but its implementation has never felt as urgent as it does now. With sophisticated and tireless cyberthreats, a permanently expanded perimeter defining the next normal and increased support from the current administration to prioritize Zero Trust advancement, federal agencies are taking unprecedented measures to modernize their security efforts and defend against tomorrow’s attacks. Join Nextgov and Route Fifty in this episode to explore the efforts made since the Biden administration’s Executive Order on Improving the Nation's Cybersecurity and the path forward for Zero Trust.
The increasing pressure by hostile nation-states and other bad actors who are relentlessly probing the networks of federal, state and local governments underlines the importance of effective attack surface management.
MeriTalk's Defining Moments explores events that are having profound effects on government and IT. Palo Alto Networks Senior Vice President of Public Sector Dana Barnes kicks off the new series with an examination of how the global pandemic inspired a new working world.
Reliance on legacy networking architectures has seen DOD leaders across the globe contending with scalability, performance and usability constraints across their cloud access points.
The SolarWinds hack, increasing pressure on U.S. networks by foreign incursions and software vulnerabilities underline the importance of effective internet operations management.
The advent of containerized software services – and the emergence of Kubernetes to deploy and manage them – have played crucial roles in modernizing applications.
High-profile software supply chain attacks, such as SolarWinds and Kaseya VSA, have shed a glaring light on the disparity between agencies’ perceptions of security within their cloud infrastructure and the reality of supply chain threats that can impact business catastrophically.
If you had to choose between a standard utility knife and a Swiss Army knife, which one would you pick? Most people would choose the latter because it can do more.
Unit 42 brings together world-renowned threat researchers with an elite team of security consultants to create an intelligence-driven, response-ready organization.
Gone are the days of agencies trusting everything on their networks. It’s proven that malicious attacks are just as likely to come from inside a network as they are from outside
Since the pandemic began more than a year and a half ago, government agencies and their workforces, just like their private sector business counterparts
Agencies and corporations alike are facing an increase in supply chain attacks. Recently, these cyberattacks have succeeded in exfiltrating an alarming amount of data with extortion fees well beyond typical ransom prices
As vaccines have become widely available and mask restrictions eased, the federal government is poised to undergo another transformation in where, when and how its workforce operates.
Since the pandemic began more than a year and a half ago, government agencies and their workforces, just like their private sector business counterparts
This replay examines new FedRAMP policy developments, challenges agencies still face in reusing authorizations and efforts to pass legislation to put FedRAMP requirements into law.
In this replay, Palo Alto Networks Senior Director of Systems Engineering discusses how many agencies are further along the journey to Zero Trust than they think.