Page 17 - GCN, October/November 2018
P. 17

                                                            CYBERSECURITY & MODERNIZATION
  Rather than one central location, agencies now have multiple “data islands” they must protect. But they need only one security posture.
exists. Rather than one central location, agencies now have multiple “data islands” they must protect. But they need only one security posture.
That posture should, of course, begin with basic cyber hygiene, such as strong passwords and timely software patching. Beyond that, the idea of zero trust is gaining traction. The goal is to restrict users’ access to the resources they need to do their jobs.
The technology has been available for some time, and now the latest firewalls can play
a role in ensuring that users only access the applications they have been authenticated to use. And those rules are written in plain English.
We do ourselves no favors by insisting that cybersecurity is a frightening, insurmount- able problem. It’s just another challenge we have to address. And agencies do not have to
add more security tools every time they adopt a new technology, such as the cloud. Government IT leaders could make their jobs a lot easier by using the same systems to protect all their data islands and by conveying risks — and solutions — to agency executives in a way they can understand.
Rick Howard is chief security officer at Palo Alto Networks.
          T
T
T
H
S
URITY
S
H
H
E
E
E
P
ECU
Y O
P
P
A
A
AL
L
L
O
O
OA
A
A
L
L
L
OPE
T
T
T
O
O
O
N
ER
N
N
E
E
E
T
T
T
W
W
W
O
O
O
R
R
RK
K
KS
S
 R
RA
T
TIN
NG
G P
PL
LAT
T
T
F
FO
O
O
O
O
O
O
O
O
R
R
R
R
R
RM
M
M
M
M
        S
S
S
E
E
E
C
C
CU
U
UR
R
RE
E
EG
G
G
O
O
O
V
V
VE
E
E
R
R
R
N
N
N
M
M
M
E
E
E
N
N
N
T
T
TA
A
AG
G
G
E
E
EN
N
N
C
C
C
I
I
I
E
E
ES
S
S
W
W
W
I
I
I
T
T
TH
H
H
A
A
A
U
U
UT
T
TO
O
O
M
M
M
A
A
A
T
T
T
E
E
ED
D
D
P
P
PR
R
R
O
O
OT
T
T
E
E
E
C
C
CT
T
T
I
I
I
O
O
O
N
N
N
 Prevent successful cyberattacks through automation, analytics and integration. Get consistent security across clouds, networks and endpoints.
Find out how at carahsoft.com/innovation/cyber-modernization/paloaltonetworks
BUILT FOR
    TIGHT ECOSYSTEM INTEGRATION
EFFECTIVE PREVENTION
                                     ACCURATE ANALYTICS
CONSISTENT ACROSS NETWORK, ENDPOINT AND CLOUD
                          AUTOMATION
PROTECT DATA, APPS AND USERS ANYWHERE
N
                                                                 SPONSORED CONTENT | S-13
   15   16   17   18   19