Blog

You are invited to browse through recent posts shared by Fortinet Federal on evolving policies, programs, technologies, and integration strategies that combine to influence the operational effectiveness and success of public sector cyber assurance initiatives.

 

cyber threats

Public Sector Cybersecurity and Threat Trends

In the public sector, government must defend against the full spectrum of threat actors, whereas many in the private sector hope (often incorrectly) that they only need to be secure enough to drive intruders towards easier targets.

Jim Richberg
Jim Richberg
cybersecurity

Trusted Cybersecurity for Government

Federal government agencies serve a critical purpose and must consider the implications for mission-continuity for every decision they make. In addition, federal agencies are the targets of nation-state actors who seek espionage and more.

Steve Hoffman
Steve Hoffman
infrastructure act

Companies Ask White House to Work with Them on Infrastructure Act

On November 15, President Biden signed the $1.2 trillion bipartisan infrastructure plan into law. Officially known as the “Infrastructure Investment and Jobs Act,” the law invests billions into transportation, broadband, and utilities.

Jim Richberg
Jim Richberg
cybersecurity

Modernizing Cybersecurity in the U.S. Federal Government

On May 12, President Biden issued an Executive Order (EO) on improving cybersecurity in the United States to improve the nation’s cybersecurity and protect Federal Government networks. It tasks the Federal Government to…

Jim Richberg
Jim Richberg
cybersecurity

Transitioning to a Career in Cybersecurity

When I left the Marine Corps after many years of enjoying my service, I was eager for the next step in my career, ready to utilize the skills I had learned on the field in my day today. But for many veterans, that’s easier said than done. In fact, many veterans have significant technical training and […]

Felipe Fernandez
Felipe Fernandez

Trusted Cybersecurity for Government. Everywhere You Need It.

Enable Trusted Network Security

Start the Journey to Zero Trust with Zero Trust Network Access

Secure Cloud Computing with Agile Agency Operations

Advance Agency Threat Detection and Response

Observe and Protect Enterprise Users, Data and Devices

Modernize Networks for Security, Simplicity and Scalability