Zero Trust

7 machine identity management best practices
Managing machine identities can be just as important as managing human identities, especially in a zero-trust environment.
https://www.csoonline.com/article/3661357/7-machine-identity-best-practices.html#tk.rss_all
More posts from Jaime Contreras, MBA, CISM, CISA
View posts
Privacy Laws & Business
Jaime Contreras, MBA, CISM, CISA · As data privacy laws expand, businesses must employ protection methods · Data privacy continues to be a challenge for businesses in the U.S. since the country does not currently have a national privacy law. · https://venturebeat.com/2022/05/06/as-data-privacy-laws-expand-business ...

Tech Jobs
Jaime Contreras, MBA, CISM, CISA · Remote-working jobs vs back to the office: Why tech's Great Resignation may have only just begun | ZDNet · Inflexible policies around where staff can - and cannot - work will leave you struggling to hire, or hold on to the best talent. · https://www.zdnet.com/article/remote-worki ...

Health IT - Cybersecurity
Jaime Contreras, MBA, CISM, CISA · OCR director urges providers to strengthen cyber posture, risk management · A new HHS blog post provides a glimpse into the focus of OCR’s HIPAA enforcement for the coming year. Entities are being urged to revamp risk management policies and bolster their cyber posture. · https:/ ...
You may be interested in these jobs
-
Zero Trust Project Lead
4 weeks ago
ASRC Federal Quantico, VAThe Zero Trust Project Lead is a critical leadership role responsible for driving the planning, implementation, and ongoing management of the organization's Zero Trust security architecture. · Minimum Requirements: Minimum of years of experience in cybersecurity, with a focus on ...
-
Zero Trust
6 days ago
Leidos Undisclosed VA Customer Site+Job Summary: · We have an exciting opening for a Cybersecurity Specialist to support a large customer organization in the fast-growing National Security Group. · +Respond to congressional inquiries on Cybersecurity issues; turning cybersecurity needs and capabilities into requi ...
-
Zero Trust Engineer
1 month ago
Booz Allen Hamilton McLeanA well-designed network is critical to move data and enable the Department of Defense (DoD) to achieve their missions. · Crafting the right network with the right equipment and software requires a combination of technical skill and careful planning. · ...
Comments