Remove Data Remove Product Management Remove White Paper
article thumbnail

Mobile Security – A Requirement for National Security (E166)

FedInsider

This week on Feds At the Edge, leaders from the Federal and commercial sectors share vulnerabilities in the devices we bring from home, and the popular apps that put our sensitive data into the wrong hands. David currently leads the endpoint product management team and the security team at Lookout.

article thumbnail

Learning from Log4j: How to Keep Government Applications Secure (E127)

FedInsider

More than twenty years have passed since Log4J became the go-to cure for system administrators everywhere, but in that time, it also became a tantalizing target for malicious actors- who with a little compromised code began opening extremely hard to find doors to sensitive data.

professionals

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

Breaking the System into Tiny Little Pieces: A DoD Approach to Zero Trust & Microsegmentation (E145)

FedInsider

Patrick Thompson, Director of Infrastructure for the US Coast Guard showcases their leap forward with high-speed satellite services, turning ships into what he calls floating data centers. Close Chief Technology Officer, Communications, U.S.

article thumbnail

Adding System Observability to Monitoring for a Holistic View (E193)

FedInsider

Tom Gilmore, Enterprise Data Architect in the USMC, drops a staggering statistic: in just 2.5 Joshua Stageberg, Vice President of Product at SolarWind, dives into the exponential growth of network monitoring tools, cautioning against “tool sprawl” and the siloed observability it creates.