c
April 5, 2023, 12:40 a.m. |

Cloud Security Alliance cloudsecurityalliance.org

Originally published by Axonius and MeriTalk. Written by Tom Kennedy. “You can’t secure what you can’t see” is a common refrain in cybersecurity circles. It’s echoed in multiple Federal IT mandates, including the zero trust strategy and the event logging memo from the Office of Management and Budget. Gaining comprehensive visibility across agency networks, devices, applications, and identities is no mean feat in today’s diverse and ever-changing IT environments. An accurate, complete, an...

agency applications asset asset inventory automated axonius budget cybersecurity devices environments event event logging federal federal it identities inventory kennedy logging management meritalk networks office office of management and budget strategy trust visibility zero trust zero trust strategy

CyberSOC Technical Lead

@ Integrity360 | Sandyford, Dublin, Ireland

Cyber Security Strategy Consultant

@ Capco | New York City

Cyber Security Senior Consultant

@ Capco | Chicago, IL

Sr. Product Manager

@ MixMode | Remote, US

Corporate Intern - Information Security (Year Round)

@ Associated Bank | US WI Remote

Senior Offensive Security Engineer

@ CoStar Group | US-DC Washington, DC