TAP Into Technology Blog: Federal (2)
Federal Plans to Secure ICS Lay Groundwork for Public & Private Collaboration
Although you may find a certain amount of political turmoil in the United States, there’s a surprising amount of consensus in Washington about cybersecurity. Both parties agree that there’s no room for complacency in the face of...
CISA's 5-year strategy highlights need for visibility in ICS
Revolutions have a habit of creating new problems that their advocates did not anticipate, and the Fourth Industrial Revolution is no exception. For example, it seems safe to say that most of the engineers who overhauled industrial control...
Improving Fly-Away Kit Visibility for Tactical Federal Teams
"Fly away" kits have been in use by the federal government for years, gaining widespread adoption around 2015, with the Army's first Cyber Innovation Challenge. "The speed of technology, combined with always-changing threats, demand that...
Monitor and Maintaining Your Zero Trust Environment
Cybercrime on local and state governments is continuing to rise, as cybercriminals understand the government possesses lots of data and information that are vital and highly classified. The risks to these federal IT systems are increasing,...
Building A Zero Trust Visibility Architecture
In response to rapidly evolving cybersecurity threats, Zero Trust, a concept that emerged over 15 years ago, is now a strategic priority for government network agencies. Following reports from the Defense Innovation Board (DIB) and the...
How to Provide Visibility to the DoD’s Zero Trust Cloud Security Initiative
As the United States Department of Defense (DoD) undertakes the largest cloud migration in history, beginning with Microsoft’s winning bid for the Joint Enterprise Defense Infrastructure project, data security in the cloud is of paramount...