The Battle for Perimeter-Centric Security: Why It's Time to Evolve
Virtru
by Matt Howard
4h ago
Just in time for RSA 2004, news of the attack against Cisco firewalls serves as another sobering reminder that the battle for perimeter-centric security may have already been lost ..read more
Visit website
3 Key Takeaways from the 2024 Fed100 Awards
Virtru
by Shannon Vaughn
3d ago
Last week GovExec hosted the Fed100 awards ceremony celebrating leading innovators and forward-thinkers fostering transformation in the federal government. The event highlighted the interdependence between tech companies and the federal government, as both sides rely on each other to collaborate and drive modernization. Virtru was honored to sponsor and attend, where this year’s distinguished honorees shared insights and commentary on the future of the federal technology ecosystem.  ..read more
Visit website
Challenging the Castle Mentality: Why Your Data Needs Knightly Protection
Virtru
by Kevin Joshi
3d ago
For too long, enterprises have taken a castle-like defensive approach to cybersecurity, heavily fortifying the walls and gates around their networks and endpoints with the ultimate goal of protecting their most treasured possessions - their sensitive data. However, in today's world of widespread data sharing and collaboration, enterprises must think beyond the castle walls to protect their sensitive data as it moves outside the fortified perimeter to get business done ..read more
Visit website
Patching the Past: How CrushFTP Spotlights the Folly of Outdated FTPs
Virtru
by Editorial Team
1w ago
What’s worse than discovering a zero-day vulnerability? Having to spend time, money, and effort patching it on-prem. Some customers of CrushFTP know this struggle all too well after the most recent critical flaw discovered last week ..read more
Visit website
Whole-of-State Cybersecurity: 5 Tips from a State Cyber Leader
Virtru
by Megan Leader
1w ago
Local governing bodies, from school systems to local and tribal government, to even state government, tend to be critically underfunded. This is especially true when it comes to cybersecurity and the protection of sensitive constituent data, which is why a whole-of-state cybersecurity approach is gaining traction.  ..read more
Visit website
Microsoft's Government IT Dominance: A Growing National Security Risk?
Virtru
by Jason Green
1w ago
A recent interview with AJ Grotto, former White House senior director for cybersecurity policy, shed light on the security risks posed by Microsoft's overwhelming dominance in the government IT market. As Grotto notes, Microsoft controls a staggering 85% share of federal productivity software and an even higher portion of operating systems. This gives Microsoft significant leverage over the government and limited incentive to prioritize security ..read more
Visit website
Safeguarding Your Financial Data: Dito on Post-Tax Season Data Security
Virtru
by Editorial Team
1w ago
Tax season has come and gone, and with it came the annual flurry of sensitive financial information being exchanged between individuals, businesses, and accountants. In the midst of this data deluge, it's easy to sidestep the security of the data you’re sharing. But as cyberthreats continue to evolve and proliferate, safeguarding your financial data has never been more crucial ..read more
Visit website
CMMC 2.0 Quick-Start Guide for Defense Contractors
Virtru
by Megan Leader
1w ago
CMMC 2.0 compliance is by no means simple, but it's essential for organizations in the defense industrial base who are entrusted with controlled unclassified information (CUI) as part of their work with the U.S. federal government ..read more
Visit website
FedRAMP Authorized vs. FedRAMP Equivalent: Why One Is Definitely Better Than the Other
Virtru
by Mike Morper
1w ago
For defense contractors handling sensitive government data, ensuring robust cybersecurity protections and regulatory compliance is paramount. However, navigating the complex web of standards and data security requirements can take time and effort. Two critical frameworks that demand attention are DFARS 7012 and CMMC 2.0, both essential for companies seeking to work with the U.S. Department of Defense (DoD ..read more
Visit website
VCPEIT 2024: A Unique Approach to Data Centric Security
Virtru
by Matt Howard
1w ago
I’ll be in Nashville next week representing Virtru as a sponsoring vendor at the annual Venture Capital Private Equity Information Technology (VCPEIT) conference. Having seen many different conference formats throughout my career in software, I’ve never seen anything quite like VCPEIT. Why is it different from most conferences? Because it’s truly intimate, uniquely inclusive of sponsors, and provides attendees the opportunity to “go deep” and “get hands-on” with real-world technology solutions ..read more
Visit website

Follow Virtru on FeedSpot

Continue with Google
Continue with Apple
OR