Remove zero-trust-what-it-is-and-why-it-matters
article thumbnail

Zero Trust: What It Is and Why It Matters

GovLoop

So, the federal government , some local governments and much of the private sector now are transitioning to a zero-trust architecture. Rather than worry about perimeters, zero trust by default denies people access to enterprise information. It essentially turns traditional cybersecurity on its head. But it’s critical.

article thumbnail

May Online Training Opportunities

GovLoop

Here’s what May has to offer: Zero Trust at the State and Local Level Many state and local agencies are turning to zero trust to beef up their security architectures. PT to hear from state and local government leaders about how to implement zero-trust principles. ET/11-11:50 a.m.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Orlando’s Approach to Managing Change and Culture

GovLoop

Zero trust is a new buzzword, but not a new concept. Depending on what you read, a Forrester researcher coined the term in 2010 or it first came about at the Jericho Forum security consortium a few years before that. I would say this is a journey,” she said of zero trust. “We Does it live up to the hype?

article thumbnail

Commerce Bureau Gives Employees a Helping Hand

GovLoop

And having worked on this a few times at other federal agencies, it was a no-brainer for me to use a known, trusted and reliable solution.” All those applications and data will be protected with zero-trust security. All those applications and data will be protected with zero-trust security.

article thumbnail

Sharing Lessons Learned from Microsoft’s Joint Surveillance Audit

Microsoft Public Sector

Since we had been tracking the direction the DoD was moving, we knew what a Joint Surveillance audit was, had already engaged with a C3PAO, and previously discussed with our internal legal and others about the tradeoffs of performing one if we had the opportunity. When given the opportunity we took it. Justin: So how did the audit start?

article thumbnail

How to Take the Guesswork Out of Application Security

GovLoop

try to predict what will happen in the future, and post-execution security controls (like EDR) function in response mode,” said Satya Gupta, co-founder and Chief Technology Officer at Virsec. An interview with Satya Gupta, Co-founder and Chief Technology Officer, Virsec. A new application can provide a pathway to innovation.

article thumbnail

The GSE Public-Private Hybrid Model Flunks Again: This Time It’s the Federal Home Loan Bank System (Part 2)

The Stoop (NYU Furman Center)

Additionally, other recommendations were made to update aspects of how the FHLBanks operate to reflect the current environment rather than what existed many decades ago. It was established by Congress in 1932 and today consists of 11 regional FHLBanks that operate as one system, cross-guaranteeing each other’s debts.

2008 59