In this ebook, experts from industry and public sector offer a glimpse at the latest technology developments, share best practice tips and reveal the early value that AI is delivering to agencies across government.
Read More 禄Wayne LeRiche, the federal civilian field chief technology officer and solutions architect for Palo Alto Networks Federal, discusses how secure access service edge sets a framework for agencies to more easily implement a zero trust architecture.
Listen Now 禄From data centers through clouds and out to the edge, 5G networks are facilitating innovation at an unprecedented pace. So the question is: How can we align government and industry objectives and leverage all the resources in play to achieve the goal of open, interoperable and secure 5G networks?
Read More 禄Cybersecurity affects us all, so we wanted to make this resource inclusive. We are taking the best of what human-centered design and intentional language can teach us about effectively communicating major security shifts that are impacting and will continue to impact how you work, where you work and your ability to serve a diverse public using technology effectively and securely.
An interview with Michael Epley, Chief Architect and Security Strategist, Red Hat
Big threats, more funding and smarter technologies.
A confluence of factors push the issue into the executive suite.
Sustaining a strong cybersecurity stance is more difficult as the threat environment expands and cyberattacks become more virulent. Carolyn Duby, field CTO for Cloudera, discusses tactics — including greater collaboration between state and local governments — to maximize protection.
Protecting endpoints and personally identifiable information across the enterprise is no longer a job for siloed devices and cybersecurity staff working alone. Tony Lee, Vice President of Global Services Technical Operations at BlackBerry, explains how AI-enabled security and automation will help state and local governments address the cybersecurity challenges of today and tomorrow.
Drew Schlussel, director of product marketing at Wasabi, explains why traditional disaster recovery strategies aren’t effective for fighting ransomware and what organizations can do to make their systems less attractive to attackers.
Remote work, the shift to cloud environments, expansion of digital services and other trends have altered the threat terrain. Chris Radosh, vice president and general manager for U.S. federal business at Trend Micro, discusses emerging tools and practical strategies for advanced threat protection.
To outwit today’s cyber criminals, security professionals must think as cunningly as their adversaries. But doing so requires a change in perspective, says CDG Senior Fellow Morgan Wright. Wright is an adviser to the U.S. Congress House Science, Space and Technology Committee. He previously served as a senior adviser in the U.S. State Department Antiterrorism Assistance Program and was senior law enforcement adviser for the 2012 Republican National Convention. Here’s what Wright had to say about thinking differently about security.
Government and nonprofit leaders from the CISA, OIG, and DOC join industry leaders from Forcepoint, Fidelis Cybersecurity, and Forward Networks to discuss how zero trust architecture is changing government cybersecurity.
As threats evolve and networks expand, the need to transform the government’s cybersecurity strategies has never been more urgent.
Agencies are in search of ways to secure networks that are as fluid as the cyber world in which they operate.
AI can counter an attack faster than humans — and tip the scales back to the side of network defenders.
By understanding normal behavior, agencies can develop more granular cybersecurity strategies and control.
Agencies need to redirect their security efforts to keep pace with the changes and movements of the workforce.