Skip to main content

Become an Insider

Sign up today to receive premium content!

Sign Up
Home Home MENU
Log in

Mobile menu

  • Topics
  • Agencies
  • Tips & Tactics
  • Voices
  • Features
  • Video
  • More
    • Reviews
    • News
    • Events
    • Feds in the Field
    • CapITal
    • About Insider
  • Search

Main menu

  • Topics
  • Agencies
  • Tips & Tactics
  • Voices
  • Features
  • Video
  • More
    • Reviews
    • News
    • Events
    • Feds in the Field
    • CapITal
    • About Insider
  • Search
  • Energy & Utilities
  • Enterprise
  • Financial Services
  • Legal
  • Manufacturing
  • Nonprofit
  • Retail
  • Small Business
  • Sports & Entertainment
  • Startups

Trending Now

  • Cloud
  • Data Analytics
  • Data Center
  • Digital Workspace
  • Hardware
  • Internet
  • Management
  • Networking
  • Security
  • Software

Trending Now

Windows 10 tips and tricks

Software

Manage Windows 10 Settings for Better Performance

Uncommon Grit CDW

Hardware

HP Supports Veterans with Essential Technology

HP EliteBook Folio 9480m Ultrabook

Hardware

Review: HP EliteBook Folio 9480m Ultrabook Performs Like a Desktop

FedTech 30 IT Influencers to Follow
30 Federal IT Influencers Worth a Follow in 2022
Sep 06 2022

As federal agencies take on executive orders demanding upgrades in cybersecurity and customer service, these technology leaders can offer guidance and support.

FedTech Winter 2022 cover

FedTech Magazine

Current Issue | Archive
  • twitter
  • feed

Articles By Karen Scarfone

About the Author:

Karen Scarfone is the principal consultant for Scarfone Cybersecurity. She previously worked as a senior computer scientist for the National Institute of Standards and Technology.

Follow On:
man considering computer with square logo to the left

Security

Find Out Who and What Is Accessing Your Digital Assets

Federal agencies need to know who’s inside in order to determine who belongs.

Blue maze

Security

5 Questions to Ask as You Plan Your Zero-Trust Journey
FT71_SecuritySave_Scarfone

Security

3 Tips That Can Help Agencies Inventory Security Tools for a Zero-Trust Environment
Securing devices

Security

3 Best Practices for Returning Telework Devices Safely to the Workplace
U.S. CERT cybersecurity

Security

US-CERT Alerts Can Help an Agency Prepare for Cyberthreats
printer on yellow background

Security

Secure a Networked Printer Before It Can Be Breached
City at night with lines linking buildings to indicate networks

Networking

How to Make Sure Your VPN Can Handle the Work-from-Home Workload
Hands coming out of computer screens holding envelopes with biohazard logos on the paper coming out of the envelopes

Security

Agencies Can Hit the DMARC Target with These Simple Tips
Encryption Key Management

Security

3 Tips for Better Encryption Key Management
Cloud and TIC

Security

How Agencies Can Achieve TIC Compliance in the Cloud

Security

3 Agency Must-Have Technologies for Ransomware Defense
  • Load More Stories

aaa 1

Register

Advertisement

Trending Now

Windows 10 tips and tricks

Manage Windows 10 Settings for Better Performance

Uncommon Grit CDW

HP Supports Veterans with Essential Technology

HP EliteBook Folio 9480m Ultrabook

Review: HP EliteBook Folio 9480m Ultrabook Performs Like a Desktop

FT_Q122_Soto_ps_Hero

Review: VMware vSAN Simplifies Data Access and Sharing for Feds

TT Hero 4

Hardware

2023 Federal Tech Trends: Device Lifecycle Management Is Helping with Compliance

FedTech

Technology Solutions That Drive Government

  • About Us
  • Contact Us
  • Privacy
  • Terms & Conditions
  • Site Map
  • FedTech:

  • CDW:

Visit Some Of Our Other Technology Websites:

  • BizTech
  • EdTech
  • StateTech
  • HealthTech

Tap into practical IT advice from CDW experts.

Visit the Research Hub

Get FedTech in your Inbox Browse Email Archives
newsletter screenshot
Subscribe to FedTech Magazine Browse Magazine Archives
FedTech Winter 2022 cover
Back To Top

Copyright © 2023 CDW LLC 200 N. Milwaukee Avenue, Vernon Hills, IL 60061
Do Not Sell My Personal Information