A Roadmap for Securing AI Systems and Data
In this video interview, Gina Scinta with Thales Trusted Cyber Technologies explores the connection between AI and cybersecurity, particularly in the government sector.
In this video interview, Gina Scinta with Thales Trusted Cyber Technologies explores the connection between AI and cybersecurity, particularly in the government sector.
Agencies have been migrating to zero-trust principles since 2021. More than just meeting a mandate, the shift to zero trust makes sense for the way agencies are consuming IT, including their more expansive use of the cloud.
A patchwork of legacy identity management systems can lead to security gaps and provide an uneven user experience. Here’s how a modern system can overcome those limitations and provide greater flexibility and more granular controls.
Traditional identity verification methods have become less effective, and they’re exposing organizations to dangerous cyberattacks. But a risk management approach that includes multi-factor authentication, among other tools, can safeguard agency networks and data.
During a recent webinar, government and industry leaders discussed key steps agencies can take to implementing identity-centric security.
Beyond authenticating humans, these teams now realize they must also manage the identities of countless machines like systems, applications and devices.
A user-focused modernization project not only ensures that new technologies meet stakeholder needs; it also illuminates a new tactic for increasing security. By using the identity of individual users – whether employees, citizens or other agencies – organizations can adopt new technologies that transcend the traditional perimeters of data centers.
State and local governments are turning their attention toward identity management, to ensure that critical organization data can only be accessed by the right people, at the right time and for the right reasons. But good identity management is easier said than done.
This interview is an excerpt from our recent guide, The Future of Cybersecurity, which examines 15 trends transforming the way government safeguards information and technology. “Security is all about trust,” said Richard Breakiron, Senior Director of Cyber Solutions of ViON, an information technology enterprise solutions provider. But how do you create that trust in theRead… Read more »
Written in collaboration with Kolin Whitley, Director of Fraud and Identity Solutions, Experian Public Sector Picture a novice internet user logging on to a government portal for the first time. He’s using a desktop computer, and the process takes him a few minutes because he isn’t very tech-savvy. He also doesn’t have any details fromRead… Read more »