Rezultati pretraživanja
  1. prije 6 sati

    ICYMI: Federal CIO Suzette Kent outlines federal government's zero-trust progress by

  2. 28. sij

    We're here at 's Zero Trust Summit! Thank you and for hosting an enlightening event on the latest of federal security and IT environments modernization utilizing principles!

  3. 28. sij

    "We’re really getting agencies to act as one when it comes to acquisition.” – Bill Zielinski, Assistant Commissioner for GSA's Office of Information Technology Category, speaking at the Zero Trust Summit this morning.

    Bill Z speaking at the event, onstage in front of crowd
  4. 28. sij

    WATCH: Ms. Spinks final takeaway at the .

  5. 28. sij

    Renata Spinks of reminds the that "the enemy gets a vote" when it comes to making decisions about securing networks.

  6. 28. sij

    .'s Renata Spinks at : "The adversary is either always scanning your networks or viewing your data — whether that’s FB...LinkedIn...Twitter...The ability to aggregate that info is why the zero trust model is so important."

  7. 28. sij

    Bill Zielinski of talking about the effects of new tech like 5G: If he were leading a small agency, "I would really be tempted to think about getting rid of all my hard network infrastructure," because 5G could be a replacement tech, not just an additive one.

  8. 28. sij

    Love hearing about the “past” cyber tech work Bill Zielinski is working on vs. the “future” work his college-aged kids do - already

  9. 28. sij

    “At GSA, when we think about identity we see it as a .” – Phil Lam, GSA's Executive Director of Identity, speaking at the Zero Trust Summit this morning.

    Phil Lam, Executive Director of Identity, GSA, onstage with other panelists
  10. 28. sij

    "'Fast and cheap' is king, and passwords play into that," CISO Paul Beckman says. Thinking about better forms of security runs counter to that habit, he says.

  11. 28. sij

    “FIDO is the biggest security infrastructure innovation since SSL” says at Panel with and CISO.

  12. 28. sij

    No doubt the first use of Sexual Chocolate I’ve ever seen in a cybersecurity speech. This really should happen more often. Well played .

    Prikaži ovu nit
  13. 28. sij

    Sean Frazier of on the rapid rise of interest in zero-trust technology in the federal government: Two years ago the conversation was "10 people in a room with cigars and bad coffee," and now it's the standing-room-only

  14. 28. sij

    When it comes to pushing agencies toward adopting zero-trust tech, part of OMB's job is convincing them that "taking this journey is really a part of achieving their mission," says the Office of the Federal CIO's chief of staff, Jordan Burris.

  15. 28. sij

    The great uses a throwback to President Reagan “trust but verify” as he leads a thoughtful discussion on protecting the digital infrastructure at – mjesto: International Spy Museum

  16. 28. sij

    CAC and PIV are effective - but so are newer authentication approaches like standards - so let’s use them! (says at )

  17. 28. sij

    Agencies have made "significant progress" in adopting multi-factor authentication for users on their networks, Federal CIO says.

  18. 28. sij

    The three pillars of Zero Trust: Workforce, Workplace, Workload. — at

  19. 28. sij

    “The new perimeter is anywhere an access control decision is being made” -

  20. 28. sij

    . notes that it’s been over a decade since Operation Aurora, the alleged Chinese intrusions into major tech companies like Google. The incident made clear that state-backed adversaries had “both the capabilities and intent to go after civilian targets.”

    Prikaži ovu nit

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.