Remove Budget Remove Data Remove White Paper
article thumbnail

As cyber threats evolve, cities and counties need to safeguard staffers’ mobile devices

American City & Country

His firm is a data-centric cloud security company. The following link includes Lookout case studies and white papers and other resources. As more state and local agencies adopt cloud technology and migrate valuable data, criminals’ methods for carrying out ransomware attacks have become more sophisticated.”

article thumbnail

After an Attack: Cyber Recovery Best Practices for State & Local Agencies

FedInsider

And these organizations are likely to face tight budgets and limited manpower to deal with a cyber threat. For FedInsider, he has written many articles and white papers and acted as the moderator for over 20 interviews featuring federal, state and local officials discussing technology, policy and governmental issues.

professionals

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

North, South, East, West: Navigating the Value of Microsegmentation in a Zero Trust Environment

FedInsider

This is why all Federal agencies were directed by Executive Order 14028 and the follow-up Office of Management and Budget memo laying out a Zero Trust Strategy to implement a Zero Trust architecture by the end of September 2024. Wednesday, July 24, 2024 | 2:00PM EDT | 90 Minutes | 1.5

article thumbnail

Using the Tools at Hand to Get to Zero Trust

FedInsider

The Department of Homeland Security observed in its Zero Trust Implementation Strategy that agencies “can expect audits and budgets to hinge on questions of whether and how [they’ve] implemented zero trust for years to come.”

article thumbnail

Pentagon IG not impressed by effectiveness of DoD vendors’ award fees

Federal News Network

Auditors said without solid data, it’s hard to determine whether those award fees do much good. ( White papers are due by March 7, and winners will be announced on August 23. The IG also found problems with the Pentagon’s system for tracking those award-fee contracts.

article thumbnail

Zero Trust is Needed to Win the Cyber War

FedInsider

Tuesday, January 23, 2024 | 2:00PM EST | 1 Hour | 1 CPE Zero trust revolutionizes network security architecture because it is data-centric and designed to stop data breaches. While that is its primary purpose for government, it also increases agility for modern networks that traditional network designs can’t emulate.

article thumbnail

Cloud Architecture Matters: Improve Cloud Security by Writing Natively to the Cloud (E165)

FedInsider

He has led numerous reviews of federal data center optimization and cloud computing, and was responsible for GAO’s work on the High-Risk area of Improving the Management of IT Acquisitions and Operations. He oversees audits on the IT and cybersecurity workforce, critical infrastructure protection, and the IRS’s IT modernization efforts.