NFV + SDP = Secure Dynamic Access

Significant and rapid increases in global IP traffic and the adoption of mobile devices have challenged network service providers to scale and improve infrastructure. To address this network providers are beginning to embrace new approaches such as Network Function...

What ever happened to the Agile ATO?

Nearly two years ago, Federal agencies began embracing a shift to agile development methodologies—releasing projects in stages to get user feedback and rectify bugs early in the process and continuing to iterate and improve over time. A key challenge however was the...

The Truth About Zero Trust

In one of the biggest data breaches ever, a hacker gained access to more than 100 million Capital One customer accounts and credit card applications affecting 100 million people in the U.S. and 6 million people in Canada. According to Capital One, the breach was...

Zero Trust is a Strategy, Not a Solution

 Software Defined Perimeter architecture mandatory to ensure truly secure environments TechTarget recently published a four-part E-Handbook: Can a zero trust approach fill the security perimeter void? The four article series outlines Forrester’s vision for Zero Trust...