Ghostwritten Thought Leadership

Filters & Sorting

An Energy Company’s Approach to Proactive Critical Infrastructure Security

Recent headlines show that threats to critical infrastructure are accelerating. Adversaries’ offensive capabilities currently exceed industry’s traditional defenses, creating a need to increase plant security while keeping pace with modern business demands. When computers were first used to run Operational Technology (OT), systems like valves, pumps, and actuators were analog and isolated. Since they couldn’t be remotely reached, operators saw no need to put security infrastructure in place. A

Bridging the Air Gap: How to Harness Your Data and Protect Your OT Network

Original equipment manufacturers (OEMs) serving the Critical Infrastructure sector have a new opportunity to bundle advanced data analytics with their products. Innovative services like predictive maintenance and automatic ordering of supplies and spare parts are driven by data that must be delivered from an operating machine back to the OEM. But Critical Infrastructure operators have long been concerned about introducing potential threats from opening their operational networks for OEMs to

JEDI cancellation offers multiple benefits for DOD, industry --

As DOD moves on from JEDI, the department embraces a multi-cloud future The cancellation of the single-source $10B Joint Enterprise Defense Infrastructure (JEDI) project came as surprising, but perhaps not fully unexpected news. From its beginnings in 2017, the proposition of awarding such a massive program to a single vendor caused controversy. Protests and litigation led to significant programmatic delays that would likely have stretched on. So, after four long years, everybody lost – or did

Simplifying Security in Multi-Cloud Environments

Federal agencies are moving from Cloud First to Cloud Smart policies. In doing so, they have adopted one of the top Cloud Service Providers (CSPs). Most agencies already use more than one of the major cloud providers – like AWS and Microsoft – with others set to join the landscape. With this in mind, Palo Alto Networks launched their FedRAMP-authorized Prisma Cloud Solution, offering a comprehensive security platform covering cloud-native and multi-cloud environments. Multi-cloud environments a

Amping Data Security Can Boost Your Privacy Strategy

When large technology companies take out full page newspaper ads to talk about their commitment to privacy, and they proactively ask for government privacy legislation, you know we’ve crossed a threshold. Data Privacy is a hot topic. Consumers are ever more concerned about how their data is being used. In response, governments around the world are issuing new regulations to rein-in aggressive data collection and usage practices that so many vendors have adopted throughout the digital era. New

Beyond Data: Function Is the New Cyber Attack Surface

• With this subscription you will receive unlimited access to high quality, online, on-demand premium content from well-respected faculty in the legal industry. This is perfect for attorneys licensed in multiple jurisdictions or for attorneys that have fulfilled their CLE requirement but need to access resourceful information for their practice areas. • Our Team Account subscription service is for legal teams of four or more attorneys. Each attorney is granted unlimited access to high quality,

The World's Crash Course in Securing Remote Work - Lessons for the Long Term : @VMblog

For the last few months, organizations everywhere have been forced to confront the new reality of extended remote work. The pandemic disruption has revealed some stark realities about securing teams that must rely on tele/videoconferencing, mobile devices and the cloud, as well as securing the data they create and use to conduct business. The current moment is accelerating trends we've seen over the last 10+ years regarding the growing number of devices and methods used for accessing data. We w

Modern Workflows Demand a New Line of Defense

The cybersecurity industry grew up around keeping threats out. But in a cloud-based, collaborative remote work dynamic, that model doesn’t hold up. Rajiv Dholakia, Chief Product Officer at VERA, believes the traditional lines of defense must give way to a new defensive approach that adapts to wherever data-sharing happens. The $156 billion cybersecurity industry grew up around trying to keep threats out. From firewalls and access management to antivirus and intrusion prevention, fortifying the

How infrastructure as code can help deliver next-level digital transformation --

How infrastructure as code can help deliver next-level digital transformation Implementing new applications or code at federal agencies has long followed a lengthy path: An IT team or manager makes a request. Infrastructure team members overseeing servers, storage, security or the network then build both development and testing environments. Finally, the application or code is migrated into a separate production environment. During this slow, manual process, inconsistencies can arise because e

New Opportunities: 2020's Top 5 Shifts for Videoconferencing Consumption

Among its many impacts, the pandemic has disrupted communication for all of us. To compensate, millions worldwide have adopted videoconferencing to keep communication channels as open as possible. But something important is missing from many of the videoconferencing platforms on which we now depend—reliable, quality captioning. Captions can ease multiple challenges that conference participants regularly face, from providing equal access to the millions of deaf or hard of hearing (DHOH) individu

5 steps to prepare for CMMC --

Tablestakes are raised but that's a good thing It’s full steam ahead for the Department of Defense Cybersecurity Maturity Model. This new requirement will start showing up in DoD Requests for Information as of June, although actual certification is not required until contract award. In preparing for it, hundreds of thousands of defense contractors must take a formalized and structured approach to their cybersecurity policies and procedures – and prove their efficacy to government-sanctioned au

Contracting Excellence Journal

What follows is an update of Arnaud Cervera’s article that was originally published March 14, 2020, on LinkedIn. We preface his piece with an endorsement from Tim Cummins, President of IACCM, who stated recently, “This is an excellent article and absolutely hits the right points on the combination of simplification and the use of artificial intelligence (AI.) I’d like to suggest there are two additional issues that need to be addressed to make this change fast and effective. • None - IACCM has

Technology choices must reflect our changed environment --

The remote work challenges imposed by the COVID-19 pandemic highlight the aging and insufficient infrastructure that has long powered much of the federal government. Aside from the widely discussed latency and security issues the current situation has presented, running on dated systems also requires more administration and maintenance, increasing the burden on agency resources. When huge portions of the workforce went remote, undersized virtual private networks (VPN), virtual desktop infrastru

Why Artificial Intelligence (AI) is transforming the entire procurement process

Although traditional methods of procurement still exist in some organizations, more and more enterprises are turning en masse toward digital procurement — the practice of converting purchasing management processes from analog to digital information-technology-based systems. This transformation couldn’t come at a better time! Artificial Intelligence (AI ) and machine learning technology can replace most traditional procurement processes offering better results and costs savings for companies. No

Locking Down the House: Benefits and Risks of Corporate Security Policies in Employees Homes

Much of the workforce is now well into the pandemic-driven remote work model. We’re learning on the fly about new norms, opportunities and risks, with insights coming up unexpectedly and often. Previously considered a privilege, wide-scale remote working became essential almost overnight. Suddenly, business leaders are realizing that quality work can and does get done this way. As a result, many are already factoring the greater potential for associated financial benefits. For example, a March

No more patient zero: A new paradigm for agency network protection

This content is provided by Palo Alto Networks. Imagine receiving an email from a trusted colleague who asked that you review the attached PDF before it is sent to leadership. When you open the PDF, you see several pop-ups flash on the screen, and then you see it. On your screen you see a banner that says, “Oops your files have been encrypted!” You have been the target of a phishing email that contained ransomware. More than likely your agency has spent significant money on cybersecurity tools,
Load More Articles