
Sign up to save your podcasts
Or
Technology maturing, constant attacks, automated responses
For the last ten years, everybody in federal software has been discussing the maturity model. We all know that a system must start, be managed, and be optimized. Unfortunately, only recently have advances in hardware and software allowed this process to take place.
Today, we listen to a conversation between a federal technology expert and a commercial subject matter expert with a focus on cybersecurity in a post-pandemic era. Covid kickstarted the ability for federal leaders to be able to be transparent and to collaborate securely. Perhaps this is a story about the technology maturing to give the ability to have an observability in a system with high compliance.
For example, Brian Dennis, Principal Technologist Public Sector, Akamai points out that micro-segmentation has always been known to prevent malicious actors from moving into the network. For years, this process has been clunky and woefully inadequate. Brian suggests that modern systems can make micro segmentation, and its impact on zero trust, easy and flexible.
Today’s federal agencies are under constant attack and must be adaptable enough to accomplish configuration and change management. Automation may hold the method to accomplish this complicated goal.
Many agencies have billions of actions a day and no human can keep up with responding to attacks. Today, systems are available where threats can be responded to in a rapid, automated, manner.
5
55 ratings
Technology maturing, constant attacks, automated responses
For the last ten years, everybody in federal software has been discussing the maturity model. We all know that a system must start, be managed, and be optimized. Unfortunately, only recently have advances in hardware and software allowed this process to take place.
Today, we listen to a conversation between a federal technology expert and a commercial subject matter expert with a focus on cybersecurity in a post-pandemic era. Covid kickstarted the ability for federal leaders to be able to be transparent and to collaborate securely. Perhaps this is a story about the technology maturing to give the ability to have an observability in a system with high compliance.
For example, Brian Dennis, Principal Technologist Public Sector, Akamai points out that micro-segmentation has always been known to prevent malicious actors from moving into the network. For years, this process has been clunky and woefully inadequate. Brian suggests that modern systems can make micro segmentation, and its impact on zero trust, easy and flexible.
Today’s federal agencies are under constant attack and must be adaptable enough to accomplish configuration and change management. Automation may hold the method to accomplish this complicated goal.
Many agencies have billions of actions a day and no human can keep up with responding to attacks. Today, systems are available where threats can be responded to in a rapid, automated, manner.