article thumbnail

Budgeting Priorities for Federal Deployment of Zero Trust (E130)

FedInsider

No longer trying to define what it is, focus is now on the affordability within already challenged budgets. For FedInsider, he has written many articles and white papers and acted as the moderator for over 20 interviews featuring federal, state and local officials discussing technology, policy and governmental issues.

Budget 134
article thumbnail

Budgeting Ideas to Reach a Zero Trust Future

FedInsider

In the face of new and growing threats many federal, state and local IT budgets stay the same, however. The challenge becomes how to plan and implement a zero trust environment within budgets that are slow to increase. Creating a zero trust environment holds a lot of promise to provide significantly improved cybersecurity.

Budget 131
professionals

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

Budgeting Ideas to Reach a Zero Trust Future

FedInsider

In the face of new and growing threats many federal, state and local IT budgets stay the same, however. The challenge becomes how to plan and implement a zero trust environment within budgets that are slow to increase. Creating a zero trust environment holds a lot of promise to provide significantly improved cybersecurity.

Budget 98
article thumbnail

Agencies May Find the Keys to IT Modernization in the Cloud

FedTech Magazine

Administrators use their years of experience to plan within budget cycles. A recent white paper from CDW Government, “How a Modernized IT Environment… Federal IT modernization is often a many-headed creature. Expert technologists must determine the requirements for an IT refresh.

IT 60
article thumbnail

Make Progress in Incident Response & Reporting

FedInsider

In August of that year, the Office of Management and Budget issued Memorandum 21-31 setting specific requirements for agencies to meet, for which the Cybersecurity and Infrastructure Security Agency (CISA) issued guidance regarding implementation.

article thumbnail

As cyber threats evolve, cities and counties need to safeguard staffers’ mobile devices

American City & Country

The following link includes Lookout case studies and white papers and other resources. LeMaster says IT security budgets may be somewhat tight for cities and counties. It uses a defense-in-depth strategy to address the different stages of modern cybersecurity attacks, which now start with infiltrations of mobile devices.

article thumbnail

After an Attack: Cyber Recovery Best Practices for State & Local Agencies

FedInsider

And these organizations are likely to face tight budgets and limited manpower to deal with a cyber threat. For FedInsider, he has written many articles and white papers and acted as the moderator for over 20 interviews featuring federal, state and local officials discussing technology, policy and governmental issues.