Data-driven decision-making: The power of enhanced event logging

Explore the forefront of federal cybersecurity with Microsoft’s innovative approach to event logging and learn how those solutions are shaping the future of digital security.

The post Data-driven decision-making: The power of enhanced event logging appeared first on CyberScoop.

Continue reading Data-driven decision-making: The power of enhanced event logging

As agencies move towards multi-cloud networks, proactive security is key

Palo Alto’s Joe Sangiuliano shares his insights on how agencies can streamline efforts, consolidate vendors and enhance risk postures in the dynamic landscape of modern multi-cloud networks.

The post As agencies move towards multi-cloud networks, proactive security is key appeared first on CyberScoop.

Continue reading As agencies move towards multi-cloud networks, proactive security is key

Ensuring compliance without compromising on IT modernization initiatives

Cloud providers can play a key role in modernizing how government agencies ensure compliance across their workloads, says security leader Jeanette Manfra.

The post Ensuring compliance without compromising on IT modernization initiatives appeared first on CyberScoop.

Continue reading Ensuring compliance without compromising on IT modernization initiatives

Navigating the path to passwordless authentication

Not all paths to passwordless authentication are equal, but adopting an integrated approach can better prepare enterprises for a passwordless future.

The post Navigating the path to passwordless authentication appeared first on CyberScoop.

Continue reading Navigating the path to passwordless authentication

How trust, connection and understanding can shape the future of cyber

Tim Li is a principal at Deloitte Risk & Financial Advisory and Deloitte Touche LLP and leads Deloitte’s Strategic Growth Cyber portfolio for federal, state and local governments and higher education institutions. Cybersecurity incidents continue to make headlines, challenging public agencies in the US to modernize cybersecurity defenses to protect citizens and the country.  The recent Executive Order (EO) on Improving the Nation’s Cybersecurity calls for the federal government to “improve its efforts to identify, deter, protect against, detect and respond to these actions and actors.” As cyber challenges evolve in complexity and scale, they create multi-faceted challenges for government.  So, while the EO lays out a solid foundation of recommendations, organizations should also take heed of the following considerations as they evolve their future cyber thinking: Enable trust as the foundation for collaboration. The EO calls for the private sector to share information with government to improve overall cyber […]

The post How trust, connection and understanding can shape the future of cyber appeared first on CyberScoop.

Continue reading How trust, connection and understanding can shape the future of cyber

Government learns that authenticators are key part of modernization

Now that federal agencies have shifted to mass telework and sorted through many of the related hardware and software needs, they’re able to take a closer look all the pieces necessary to implement zero-trust security architecture, a cybersecurity expert says. In particular, agencies have greatly embraced the use of different kinds of authenticators to help identify users and control their network access, said Brian Rosensteel, Cybersecurity Architect at Duo Security, during an SNG Live virtual discussion panel hosted by Scoop News Group on Oct. 20. Federal IT leaders are seeing that for telework, old forms of proving identity don’t translate, and they’re looking for other solutions. “That’s where we’ve seen zero trust really starting to take place,” he said. The zero-trust model assumes that the network is penetrable, so it forces users to verify themselves for each set of data or applications they want to access once they’re on the […]

The post Government learns that authenticators are key part of modernization appeared first on CyberScoop.

Continue reading Government learns that authenticators are key part of modernization

How Microsoft is future proofing against cyber risk

Shifts in the way that enterprises and government organizations implement identity management technologies already were underway before the coronavirus pandemic struck. The sudden influx of remote work, however, has forced security personnel throughout the U.S., and the world, to accelerate plans to mitigate cyber risk. “When billions of people formed the largest remote workforce ever, overnight, pretty much we knew security, compliance and identity would not be small issues for folks,” said Ann Johnson, Corporate Vice President of Security, Compliance and Identity Business Development at Microsoft during a virtual presentation Oct. 21 at CyberTalks, the annual summit of security leaders from the government and private sector presented by Scoop News Group. Johnson went on to provide insights on how chief information security officers have adapted to a world where telecommuting is now the norm. Now, she said, more people are starting to look ahead, too. One such organization that was […]

The post How Microsoft is future proofing against cyber risk appeared first on CyberScoop.

Continue reading How Microsoft is future proofing against cyber risk

Security transformation is about more than technology

When it comes to an effective transition away from legacy technology systems to more modern, efficient security tools, organizations stand to gain the greatest benefits if they communicate the value of digital transformation in advance and implement the right changes. Jeanette Manfra, Director of Government Security and Compliance at Google Cloud, which specializes in services ranging from data centers to backup technologies, said that a proactive mindset can help organizational leaders overcome obstacles that arise during a digital transformation. During a keynote session at CyberTalks, the annual summit of security leaders from the government and private sector hosted by Scoop News Group, Manfra explained that effective buy-in from throughout a company, or government agency, can streamline both technology and other operations. “Security practitioners in particular, whether real or perceived, can be blockers and not enablers,” she said. “And so one of the things that both working with customers and in […]

The post Security transformation is about more than technology appeared first on CyberScoop.

Continue reading Security transformation is about more than technology

Election security pros focus on effective partnerships

Trust the process. That’s the message from a group of election security experts who, during a virtual panel discussion at CyberTalks, said they are working to safeguard the 2020 election from an array of cybersecurity threats. Benjamin Hovland, a commissioner on the U.S. Election Assistance Commission, Jack Cable, an election security technical adviser at the U.S. Department of Homeland Security’s Cybersecurity and Infrastructure Security Agency, and Matt Masterson, a senior cybersecurity adviser at CISA, explained that the goal isn’t only to protect the Nov. 3 election, but also to ensure that the American people can trust the results. The CyberTalks panel was led by John DeSimone, vice president of cybersecurity, training and services at Raytheon Intelligence and Space. In a series of questions, DeSimone, probed the election security experts on the ways that U.S. government entities and the defense industrial base are working together “from a mission assurance perspective” to protect […]

The post Election security pros focus on effective partnerships appeared first on CyberScoop.

Continue reading Election security pros focus on effective partnerships

How cloud transformation helps stop emerging threats

Automation, agility, efficiency and cost play critical roles in accelerating public sector transformation through the cloud, according to an experienced cybersecurity-focused executive with an eye on the future. They also are provide a smarter, more progressive approach to protecting data, said Rajiv Gupta, a senior vice president in the cloud security business unit at McAfee, during an Oct. 20 presentation at CyberTalks, the annual summit of government and private sector leaders presented by Scoop News Group. The need to consider more modern security approaches has taken on new urgency since the COVID-19 pandemic impacted U.S. firms, forcing leaders to reconsider many of their operating assumptions. “Not only have you seen, in the U.S., employees working from home but, in many cases, the employees accessing large public cloud services,” Gupta said during a keynote presentation. “What we’ve seen is that a threat landscape has changed, the threat vectors have changed, the […]

The post How cloud transformation helps stop emerging threats appeared first on CyberScoop.

Continue reading How cloud transformation helps stop emerging threats