Skip links

Tag: zero trust

Understanding What Cybersecurity Maturity Model Certification 2.0 Means to Your Agency

On January 31, 2020, the Department of Defense (DoD) announced the creation of the Cybersecurity Maturity Model Certification (CMMC). The CMMC is a certification procedure developed by the DoD to certify that contractors who work with the Department have the necessary controls to protect their data by enhancing cyber protection standards and increasing assurance on the DoD that

Key Cybersecurity Initiatives Within the New Infrastructure Bill

Improving state and local government cyber resilience   Cyberattacks and ransomware plague the state and local governments and cost taxpayers billions of dollars. Cyberattacks cost organizations about $18.88 billion in recovery costs and downtime in 2020, and municipal governments were subject to 45% ransomware attacks in the past 12

MSPs Should Reduce Vendor Sprawl to Increase Savings

New research shows significant savings by integrating tools New research conducted by Vanson Bourne shows that consolidating and integrating cybersecurity, backup, and disaster recovery services produces $229,159 in savings on average and reduces the time required to recover from a breach or data loss incident by an average of five hours. 

How Federal Agencies are Using Technology Modernization Funds to Implement Zero Trust Architecture

The Modernizing Government Technology Act of 2017 authorized the Technology Modernization Fund (TMF). US federal agencies apply for loans with “approved projects receiving incremental funding and technical expertise to ensure project success.”  The TMF board previously awarded eleven grants with the additional $1 billion as part of the American Rescue Plan.    On September 30, 2021, the

US Supreme Court Ruling Underscores Need for Zero Trust Model

The US Supreme Court’s decision, earlier this summer, in Van Buren v. United States, should put agencies on notice. This recent ruling underscores the need for public sector entities to adopt a Zero Trust Model to prevent access to sensitive data.   The lawsuit stated a former Georgia police sergeant used his patrol-car computer to access
Padlock in blue

Implementing a Secure Approach in a Zero Trust World

The Origins of Zero Trust If you keep pace with cybersecurity trends, you have undoubtedly heard the term “zero trust” with increasing frequency in recent years. The term, first coined by Forrester analyst John Kindervag in 2010, and popularized by Palo Alto Networks in years since, refers to a
Critical-Infrastructure-Featured Image

America’s Critical Infrastructure in the Crosshairs | Understanding the Cyber Threat Landscape

OVERVIEW America’s critical infrastructure includes 16 diverse though often interconnected sectors: energy, water and wastewater, transportation, dams, communications, chemical, commercial facilities, critical manufacturing, the defense industrial base, emergency services, food and agriculture, government facilities, healthcare and public health, information technology, financial services, and nuclear reactors,