“Mission Possible”: How DTEX is Supporting National Security from the Inside Out

When considering the most significant cyber threats to the public sector, many immediately think of foreign adversaries breaching federal agencies. This perception is understandable, as nation-state cyber attacks often dominate headlines. However, ...

The CJIS Compliance Deadline is Fast Approaching | Is your state / local government ready?

The deadline for CJIS compliance is rapidly approaching – it is mandated that all entities accessing criminal justice information (CJI) must have an acceptable multi-factor authentication (MFA) solution in place by October ...

Zero Trust Meets Insider Risk Management

What do Jack Teixeira, Joshua Schulte, and Korbein Schultz have in common? All three worked for the federal government in some capacity, and all three used their insider access for nefarious purposes, ...

Insights from CISA HPH Sector Risk and Vulnerability Assessment

In an ever-evolving digital landscape, the healthcare and public health (HPH) sector faces increasing cybersecurity challenges. The United States Cybersecurity and Infrastructure Security Agency (CISA) recently conducted a Risk and Vulnerability Assessment ...
STIGs, FIPS, ZT, and API Security

STIGs, FIPS, ZT, and API Security

| | Public Sector
Leading by Example The United States has been a leader in information technology for decades, and the U.S. government has been a major driver in that arena from the start. Considering the ...
DoD Identifies API Security as Critical for Zero Trust

DoD Identifies API Security as Critical for Zero Trust

The opening line of the newly published Department of Defense (DoD) Zero Trust Strategy should be a warning to all: “Our adversaries are in our networks, exfiltrating our data, and exploiting the ...
Forrester Identifies API Security as an Important Technology Category in a Zero Trust Architecture

Forrester Identifies API Security as an Important Technology Category in a Zero Trust Architecture

| | Public Sector
The global research firm, Forrester, recently published its latest Forrester Tech Tide™(1) focused on twenty technologies that underpin Zero Trust threat prevention. By analyzing business value and maturity of each technology , ...
Stolen Future: How Data Theft Dilutes Our Growth Trajectory

Stolen Future: How Data Theft Dilutes Our Growth Trajectory

| | Public Sector
During my 34-year career in federal law enforcement, I repeatedly saw the damage data theft caused to unsuspecting victims. Whether the result was an elderly retiree losing their life savings, a company ...
How API Security Can Help You Prepare For FedRAMP

How API Security Can Help You Prepare For FedRAMP

| | Public Sector
Cloud companies that wish to do business with the United States federal government can only do so if they receive authorization under the Federal Risk and Authorization Management Program (FedRAMP). For a ...
Application Programming Interfaces (APIs): The Soft Underbelly of Zero Trust

Application Programming Interfaces (APIs): The Soft Underbelly of Zero Trust

| | Public Sector
Zero Trust is a great framework to protect our IT assets, operations, and data.  It has gained a lot of attention and many followers since the idea was first introduced by John ...