Skip to main content

Data protection

Zero Trust

What Does Zero-Trust Security Mean for You?

Zero Trust security
Zero Trust security

Zero Trust

What Does Zero-Trust Security Mean for You?

Nothing is trusted inside or outside the network. Entry requires strict access controls, user authentication and continuous monitoring of networks and systems, among many elements. Users and devices that request access to resources are continually authenticated. 

Anti-Phishing

Securing Remote Work

Anti-Phishing
Anti-Phishing

Anti-Phishing

Securing Remote Work

Like many agencies, the Department of Veterans Affairs has had to support a large remote workforce during the pandemic. But that can lead to vulnerabilities, such as users clicking on malicious links. How can agencies protect users from such threats?

Cloud Security

How FedRAMP Keeps Feds Secure

Cloud Security
Cloud Security

Cloud Security

How FedRAMP Keeps Feds Secure

FedRAMP aims to "provide a standardized approach to security assessment, authorization and continuous monitoring for cloud products and services,” in the words of former Federal CISO Greg Touhill.

The federal government faces a wide range of cybersecurity threats, from insider threats to phishing attacks and sophisticated campaigns from nation-state actors. However, agencies also employ a powerful array of security solutions to keep government users and citizens’ data safe. Follow our coverage of federal cybersecurity efforts here for the latest on agencies’ IT security efforts.

How Does Zero-Trust Security Work?

There’s more than one way to build zero-trust architecture; these screening components are among the most common.
The Continuous Diagnostics and Mitigation program helps agencies monitor network vulnerabilities and lets DHS see possible threats. Learn about CDM >
Security information and event management tools can help agencies aggregate expanding data for real-time analysis. What is SIEM? >
Logs keep track of user behavior; trust algorithms analyze that behavior for abnormalities. Learn more >
Proving identity becomes even more important as federal employees work remotely. Gain access >

Check out all of our National Cybersecurity Awareness Month coverage

Filter Articles
Close Filters See More Filters

Insider Exclusive

Get Cybersecurity Insights from Experts

Insider
Insider

Insider Exclusive

Get Cybersecurity Insights from Experts

Become an Insider to get access to exclusive Q&A’s with security experts and early access to our most in-depth security stories. You’ll also gain access to a personalized dashboard that makes it easy to stay up to date on the latest in federal government IT.

CDW Register Timed Modal

Copyright © 2020 CDW LLC 200 N. Milwaukee Avenue, Vernon Hills, IL 60061