Application Programming Interfaces (APIs): The Soft Underbelly of Zero Trust

Application Programming Interfaces (APIs): The Soft Underbelly of Zero Trust

| | Public Sector
Zero Trust is a great framework to protect our IT assets, operations, and data.  It has gained a lot of attention and many followers since the idea was first introduced by John ...
cybersecurity fellowship web app election security government

Why Public-Private Partnership is Key to Cybersecurity

The federal government is currently handicapped in a way it has not experienced before. Because the digital domain is man-made, governments around the world have different levels of access and freedom of ...
Security Boulevard
legacy remote work cities mayors collaboration remote workforce security

5 Reasons the Public Sector Must Move Away From Legacy IT

Legacy IT software is costing the taxpayer, it’s damaging the security of public services infrastructure and it’s bad for the environment—something governments drastically need to address in the next 10 years if ...
Security Boulevard
Protecting the US Government from Cyber Attacks

Protecting the US Government from Cyber Attacks

The US government--along with private organizations regardless of size or industry--has been a prime target this year for cyber attacks and cyber espionage. As a dominant economic, political, and military force in ...
A graphic illustrating the "treasure trove" of data that public sector organizations represent to cybercriminals

Public Sector, Another Vulnerable Target to Attackers

Cybercriminals are continually scheming ways to get their hands on your sensitive data. Learn how to protect your data & stakeholders before it’s too late Private and public sector organizations... The post ...
Cybersecurity for the Public Sector: Partnering with Carahsoft

Cybersecurity for the Public Sector: Partnering with Carahsoft

Cybersecurity for the Public Sector: Partnering with Carahsoft   The public sector is on alert. Cyber breaches occur at an accelerated rate; attackers are getting more intelligent, more sophisticated, and better funded ...
Protecting Industrial Control Systems Against Cyberattacks - Part 1

Protecting Industrial Control Systems Against Cyberattacks – Part 1

Well Designed, Yet Highly Vulnerable Despite being decades old, SCADA control systems remain well-designed to this day. They bring multiple moving parts together - computers, networks, data communications and user interfaces - ...
IAM privacy cloud security Biometrics: Giving the Government the Finger

Cloud Security Remains Elusive in Public Sector

Despite the move to the cloud, many government entities grapple with long-standing, cloud-related cybersecurity challenges. Consider a recent survey from data security provider Netwrix, based on responses from 937 IT professionals. This ...
Security Boulevard
Supporting COVID-19 Vaccine Rollouts with Vaccine Edge

Supporting COVID-19 Vaccine Rollouts with Vaccine Edge

Global efforts to produce and distribute the COVID-19 vaccine continue to race ahead. But in many cases, that race is an uphill climb. Beyond the challenges in making enough of the vaccine, ...