Remove Distribution Remove Networking Remove White Paper
article thumbnail

Applying Zero Trust Architecture in State & Local Government

FedInsider

Rather than using a “hub-and-spoke” method of connecting employees to servers, data, applications, and each other – where cybersecurity focused on firewalls around the perimeter – suddenly the systems had to become decentralized, distributed and open to remote workers.

article thumbnail

Cloud Architecture Matters: Improve Cloud Security by Writing Natively to the Cloud (E165)

FedInsider

Prior to Akamai, Mr. Bonci was involved in the Open Source community as an engineer at VA Linux and as a contributor to the Debian Linux Distribution. Over this 14 year tenure, he had numerous roles in the public sector, including engineering management and as an individual contributor in systems engineering and web applications.

professionals

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Letting the Good Ones In, Keeping the Bad Ones Out: Managing Access for Zero Trust (E140)

FedInsider

In this role, John was responsible for managing risk in the cyber domain and ensuring security throughout DISA and the Department of Defense Information Network (DoDIN). His portfolio included mobility, networks operations, cybersecurity, and innovation. He is also an Eagle Scout.

article thumbnail

Zero Trust Needed to Win the Cyber War (E157)

FedInsider

Zero Trust has revolutionized the way agencies everywhere are securing their networks, and this week on Feds at the Edge , we talk with titans in the field, including John Kindervag, Chief Evangelist with Illumio, who in 2010 coined the phrase “ zero trust model.” Limiting our understanding to “the main and the plain” could lead to trouble.

article thumbnail

Cloud Architecture Matters: Improve Cloud Security by Writing Natively to the Cloud

FedInsider

Prior to Akamai, Mr. Bonci was involved in the Open Source community as an engineer at VA Linux and as a contributor to the Debian Linux Distribution. While at the Pentagon with HQDA CIO/G-6, he served in leadership roles for strategic initiatives managing an Army-wide IT reform and network modernization effort. security agencies.

article thumbnail

Friday Flash 02/23/2024

The Coalition for Government Procurement

DoD Looks to Increase Small Business Opportunities Through National Defense Industrial Strategy According to Federal News Network , the Department of Defense (DoD) National Defense Industrial Strategy provides an opportunity for it to be “more approachable for small businesses.” We look forward to your participation!

article thumbnail

Election Security: Protecting the Foundation of Democracy – Election Integrity

FedInsider

In addition to distributing critical funding, the EAC strategically pivoted resources to help election officials as they confronted obstacles and made difficult decisions of how to best run their elections. In accordance with the standards of the National Registry of CPE Sponsors, 50 minutes equals 1 CPE.