Skip to main content

Become an Insider

Sign up today to receive premium content!

Sign Up
Home Home MENU
Log in

Mobile menu

  • Topics
  • Agencies
  • Tips & Tactics
  • Voices
  • Features
  • Video
  • More
    • Reviews
    • News
    • Events
    • White Papers
    • Must Follow Influencers
    • Feds in the Field
    • CapITal
    • 2020 Census
    • Windows 10 Migration
    • Election Security
    • About Insider
  • Search

Main menu

  • Topics
  • Agencies
  • Tips & Tactics
  • Voices
  • Features
  • Video
  • More
    • Reviews
    • News
    • Events
    • White Papers
    • Must Follow Influencers
    • Feds in the Field
    • CapITal
    • 2020 Census
    • Windows 10 Migration
    • Election Security
    • About Insider
  • Search
  • Energy & Utilities
  • Enterprise
  • Financial Services
  • Legal
  • Manufacturing
  • Nonprofit
  • Retail
  • Small Business
  • Sports & Entertainment
  • Startups

Trending Now

  • Cloud
  • Data Analytics
  • Data Center
  • Digital Workspace
  • Hardware
  • Internet
  • Management
  • Networking
  • Security
  • Software

Trending Now

Windows 10 tips and tricks

Software

Manage Windows 10 Settings for Better Performance

Data security illustration

Security

Q&A: As Agencies Seek Resilience After Cyberattacks, Tools Adapt to Meet New Needs

What is a cybersecurity audit

Security

What Is a Cybersecurity Audit and Why Is It Important?

FedTech IT Influencers
30 Federal IT Influencers Worth a Follow in 2021
Jul 29 2021

Federal technology leaders offer insights and thought leadership on a sharp rise in cyberattacks, the shift to hybrid work and much more.

FedTech q1 2022 cover

FedTech Magazine

Current Issue | Archive
  • twitter
  • feed

Articles By Karen Scarfone

About the Author:

Karen Scarfone is the principal consultant for Scarfone Cybersecurity. She previously worked as a senior computer scientist for the National Institute of Standards and Technology.

Follow On:
Blue maze

Security

5 Questions to Ask as You Plan Your Zero-Trust Journey

Agencies can reach the right cybersecurity destination by following these guidelines.

FT71_SecuritySave_Scarfone

Security

3 Tips That Can Help Agencies Inventory Security Tools for a Zero-Trust Environment
Securing devices

Security

3 Best Practices for Returning Telework Devices Safely to the Workplace
U.S. CERT cybersecurity

Security

US-CERT Alerts Can Help an Agency Prepare for Cyberthreats
printer on yellow background

Security

Secure a Networked Printer Before It Can Be Breached
City at night with lines linking buildings to indicate networks

Networking

How to Make Sure Your VPN Can Handle the Work-from-Home Workload
Hands coming out of computer screens holding envelopes with biohazard logos on the paper coming out of the envelopes

Security

Agencies Can Hit the DMARC Target with These Simple Tips
Encryption Key Management

Security

3 Tips for Better Encryption Key Management
Cloud and TIC

Security

How Agencies Can Achieve TIC Compliance in the Cloud

Security

3 Agency Must-Have Technologies for Ransomware Defense

Mobility

The Next BYOD Challenge for Feds: Wearables
  • Load More Stories

aaa 1

Register

Advertisement

Trending Now

Windows 10 tips and tricks

Manage Windows 10 Settings for Better Performance

Data security illustration

Q&A: As Agencies Seek Resilience After Cyberattacks, Tools Adapt to Meet New Needs

What is a cybersecurity audit

What Is a Cybersecurity Audit and Why Is It Important?

IT Help Desk image of three people working on computers

ServiceNow Solutions Ease Agencies’ Ability to Track Data, Customers and More

Join FedTech as we cover Imagine Nation ELC 2019

Event

Imagine Nation ELC 2019

Subtopics

Hashing vs. Encryption: What’s The Difference?

Security

What Is the Difference Between Hashing and Encryption for Federal Agencies?

FedTech

Technology Solutions That Drive Government

  • About Us
  • Contact Us
  • Privacy
  • Terms & Conditions
  • Site Map
  • FedTech:

  • CDW:

Visit Some Of Our Other Technology Websites:

  • BizTech
  • EdTech
  • StateTech
  • HealthTech

Tap into practical IT advice from CDW experts.

Visit the Research Hub

Get FedTech in your Inbox Browse Email Archives
newsletter screenshot
Subscribe to FedTech Magazine Browse Magazine Archives
FedTech q1 2022 cover
Back To Top

Copyright © 2022 CDW LLC 200 N. Milwaukee Avenue, Vernon Hills, IL 60061