Putting a Value on Trust — Introducing Zero Trust Security Approaches

With so many high-profile hacks this year, it's easy to want to throw up your hands and say, "Is there nothing that can be trusted?!" Interestingly, that lament is what is driving the latest approach to cybersecurity -- zero trust. Zero trust is what it sounds like, a security approach centered on the belief that organizations should not automatically trust anything accessing their systems either inside or outside their perimeters. Instead, all people and devices must be verified before access is granted. To the untrained eye, this seems untenable. How, in this day and age, when we depend on digital information and connection to do most anything, can we use a process where we have to constantly verify identity and access permissions? Luckily, the practice of zero trust is more sophisticated than its premise.

Continue reading

Federally Focused Technology Event Calendar: A reference for enterprise CTOs

Originally postes by  on FedCyber.com

There are dozens of technology related events every single week. Even with recent decisions aimed at cutting back on the number of events that the government is involved with, industry, academia and even government continues to have a strong need for bringing people together to work on hard problems. Which means there are still an incredible number of events in the government space. Our friends at GovEvents do a terrific job of capturing government-focused events and can help people find the right event to engage with. We can contribute to your decision making as well, especially if you are a technologist.

Continue reading