CDW Solutions Blog
Solutions Blog Insights From Experts Who Get IT
  • Topics
    • Cloud (317)
    • Data Center (335)
    • Digital Workspace (475)
    • Networking (267)
    • Security (326)
    • Software (336)
  • Explore CDW.com
Explore CDW.com

Topics

  • Cloud
  • Data Center
  • Digital Workspace
  • Networking
  • Security
  • Software

Subscribe to Newsletter

5 Important Deployment Models for Zero-Trust Architecture

Guidance from NIST can help organizations better implement this bedrock approach to security.

By John Dzurick
|
March 22, 2021
Data Center, Security

Cybersecurity philosophies have changed significantly over time to adapt to the changing needs of the organizations they serve. In the early days of cybersecurity, we focused on building boundaries between the “inside” and the “outside.” Users and devices that we trusted were placed inside network perimeters and granted largely unfettered access to systems and data within that environment. Those on the outside were untrusted and blocked from accessing sensitive resources. While that approach served us well for decades, it fails to meet the needs of increasingly mobile and cloud-focused organizations as well as increasingly sophisticated and covert threats and malware. The evolution of the perimeter of the network has made it difficult to draw lines between “inside” and “outside” effectively.

Zero-trust architecture (ZTA) represents a philosophical shift in cybersecurity planning that seeks to address this limitation by making trust decisions based on the identity of a user or device, rather than the location.

Read More   

Exploring the NIST Cybersecurity Framework

This standard describes the five most important steps an organization can take to secure its information systems.

By Mikela Lea
|
June 2, 2020
Security, Services

In my work with CDW customers, I often come across technology leaders who want to improve their cybersecurity posture but aren’t really sure where to start. They might recognize that their organizations need to improve their cybersecurity controls but don’t know where their investments will pay off the most.

When I hear concerns like this, I immediately look to the Cybersecurity Framework (CSF) developed by the National Institute of Standards and Technology (NIST). While there are many different cybersecurity standards out there, I prefer this one because it uses plain language to describe the five most important activities in cybersecurity. I’d like to walk you through this framework using two different examples.

Read More   

A Brief Guide to Implementing the NIST Security Framework

These steps can help federal agencies meet the requirements of NIST’s Risk Management Framework.

By Mark Erbach  and Keshun Morgan
|
January 22, 2020
Security

Federal agencies are re-emphasizing the need to develop and deploy government cybersecurity solutions using the Risk Management Framework published by the National Institute of Standards and Technology.

Agency technology leaders bear responsibility for ensuring that their cybersecurity programs operate in compliance with the RMF. For organizations with little experience, this effort can be overwhelming , but taking a methodical approach to RMF implementation will yield significant benefits. Let’s take a look at three steps agency leaders can take to begin a robust cybersecurity program.

Read More   

How Secure Do You Want to Be?

The answer to this simple question can help your organization achieve its security objectives.

By Jeff Falcon
|
December 13, 2018
Security, Services

In years past, many organizations took a passive approach to cybersecurity. They’d sit back and wait for something bad to happen, then react to it. That approach is no longer acceptable for just about any organization. If you think your organization isn’t a target or that it doesn’t have anything that cybercriminals want, you’re wrong….

Read More   
Most Popular
Digital Workspace | Security

Prioritize These Security Considerations as Users Work from Home More Frequently

Digital Workspace

8 Things to Consider Prior to Deploying Microsoft Teams

Digital Workspace | Services

Why Adoption Services Are More Important Than Ever

Digital Workspace | Networking

5G Is the Future of the Internet of Things

Digital Workspace | Security

Overcoming the Cybersecurity Skills Gap with Automation

Recommended for You
Topics
  • Cloud
  • Data Center
  • Digital Workspace
  • Networking
  • Security
  • Software
Connect With CDW
  • Explore
    • Our Experts
    • CDW.com
    • BizTech
    • EdTech
    • FedTech
    • HealthTech
    • StateTech
  • CDW Solutions
    • Solutions Center
    • Cloud
    • Data Center
    • Digital Workspace
    • Security
  • Connect With CDW

Copyright 2007-2021 CDW. All Rights Reserved