野花社区

  • Why Zero Trust Matters at Work (and How to Foster It)

    Cybersecurity affects us all, so we wanted to make this resource inclusive. We are taking the best of what human-centered design and intentional language can teach us about effectively communicating major security shifts that are impacting and will continue to impact how you work, where you work and your ability to serve a diverse public using technology effectively and securely.


    • Cybersecurity , All
  • Practical Ways to Make Zero Trust a Reality and Add Value

    An interview with Michael Epley, Chief Architect and Security Strategist, Red Hat


    • Cybersecurity , Red Hat
  • The Best of What’s New in Cybersecurity

    Big threats, more funding and smarter technologies.


    • Cybersecurity , All
  • Finally, Cybersecurity Gets the Attention It Deserves

    A confluence of factors push the issue into the executive suite.


    • Cybersecurity , All
  • Achieving a Sustainable Cybersecurity Strategy

    Sustaining a strong cybersecurity stance is more difficult as the threat environment expands and cyberattacks become more virulent. Carolyn Duby, field CTO for Cloudera, discusses tactics — including greater collaboration between state and local governments — to maximize protection.


    • Cybersecurity , Cloudera
  • Intelligent, Ubiquitous Security

    Protecting endpoints and personally identifiable information across the enterprise is no longer a job for siloed devices and cybersecurity staff working alone. Tony Lee, Vice President of Global Services Technical Operations at BlackBerry, explains how AI-enabled security and automation will help state and local governments address the cybersecurity challenges of today and tomorrow.


    • Cybersecurity , BlackBerry
  • Disaster Recovery in the Age of Ransomware

    Drew Schlussel, director of product marketing at Wasabi, explains why traditional disaster recovery strategies aren’t effective for fighting ransomware and what organizations can do to make their systems less attractive to attackers.


    • Cybersecurity , Wasabi
  • Cybersecurity at Scale

    Remote work, the shift to cloud environments, expansion of digital services and other trends have altered the threat terrain. Chris Radosh, vice president and general manager for U.S. federal business at Trend Micro, discusses emerging tools and practical strategies for advanced threat protection.


    • Cybersecurity , Trend Micro
  • Changing Your Perspective on Security

    To outwit today’s cyber criminals, security professionals must think as cunningly as their adversaries. But doing so requires a change in perspective, says CDG Senior Fellow Morgan Wright. Wright is an adviser to the U.S. Congress House Science, Space and Technology Committee. He previously served as a senior adviser in the U.S. State Department Antiterrorism Assistance Program and was senior law enforcement adviser for the 2012 Republican National Convention. Here’s what Wright had to say about thinking differently about security.


    • Cybersecurity , All
  • Cyber Leaders Panel Discussion: Zero Trust

    Government and nonprofit leaders from the CISA, OIG, and DOC join industry leaders from Forcepoint, Fidelis Cybersecurity, and Forward Networks to discuss how zero trust architecture is changing government cybersecurity.


    • Cybersecurity , All
  • The Ongoing Quest for Cybersecurity

    As threats evolve and networks expand, the need to transform the government’s cybersecurity strategies has never been more urgent.


    • Cybersecurity , All
  • Taking Aim at a Moving Cyber Target

    Agencies are in search of ways to secure networks that are as fluid as the cyber world in which they operate.


    • Cybersecurity , All
  • The Future of Cybersecurity is Autonomous

    AI can counter an attack faster than humans — and tip the scales back to the side of network defenders.


    • Cybersecurity , SentinelOne
  • Tailoring Zero Trust to Individual Users

    By understanding normal behavior, agencies can develop more granular cybersecurity strategies and control.


    • Cybersecurity , Forcepoint
  • Modernizing Security for a Mobile Workforce

    Agencies need to redirect their security efforts to keep pace with the changes and movements of the workforce.


    • Cybersecurity , BlackBerry