Zero Trust Meets Insider Risk Management

What do Jack Teixeira, Joshua Schulte, and Korbein Schultz have in common? All three worked for the federal government in some capacity, and all three used their insider access for nefarious purposes, ...

Insights from CISA HPH Sector Risk and Vulnerability Assessment

In an ever-evolving digital landscape, the healthcare and public health (HPH) sector faces increasing cybersecurity challenges. The United States Cybersecurity and Infrastructure Security Agency (CISA) recently conducted a Risk and Vulnerability Assessment ...
STIGs, FIPS, ZT, and API Security

STIGs, FIPS, ZT, and API Security

| | Public Sector
Leading by Example The United States has been a leader in information technology for decades, and the U.S. government has been a major driver in that arena from the start. Considering the ...
DoD Identifies API Security as Critical for Zero Trust

DoD Identifies API Security as Critical for Zero Trust

The opening line of the newly published Department of Defense (DoD) Zero Trust Strategy should be a warning to all: “Our adversaries are in our networks, exfiltrating our data, and exploiting the ...
Forrester Identifies API Security as an Important Technology Category in a Zero Trust Architecture

Forrester Identifies API Security as an Important Technology Category in a Zero Trust Architecture

| | Public Sector
The global research firm, Forrester, recently published its latest Forrester Tech Tide™(1) focused on twenty technologies that underpin Zero Trust threat prevention. By analyzing business value and maturity of each technology , ...
Stolen Future: How Data Theft Dilutes Our Growth Trajectory

Stolen Future: How Data Theft Dilutes Our Growth Trajectory

| | Public Sector
During my 34-year career in federal law enforcement, I repeatedly saw the damage data theft caused to unsuspecting victims. Whether the result was an elderly retiree losing their life savings, a company ...
How API Security Can Help You Prepare For FedRAMP

How API Security Can Help You Prepare For FedRAMP

| | Public Sector
Cloud companies that wish to do business with the United States federal government can only do so if they receive authorization under the Federal Risk and Authorization Management Program (FedRAMP). For a ...
Application Programming Interfaces (APIs): The Soft Underbelly of Zero Trust

Application Programming Interfaces (APIs): The Soft Underbelly of Zero Trust

| | Public Sector
Zero Trust is a great framework to protect our IT assets, operations, and data.  It has gained a lot of attention and many followers since the idea was first introduced by John ...
SEC rules, cybersecurity, SEC cyber data breach rules

Why Public-Private Partnership is Key to Cybersecurity

The federal government is currently handicapped in a way it has not experienced before. Because the digital domain is man-made, governments around the world have different levels of access and freedom of ...
Security Boulevard
SEC government legacy remote work cities mayors collaboration remote workforce security

5 Reasons the Public Sector Must Move Away From Legacy IT

Legacy IT software is costing the taxpayer, it’s damaging the security of public services infrastructure and it’s bad for the environment—something governments drastically need to address in the next 10 years if ...
Security Boulevard

Secure Guardrails