Akamai

How to ensure zero trust covers both people and applications

Zero trust architectures must cover both users and applications, and extend from the core network to the edge, all while giving all users an equal experience.

Read more

DoD Cloud Exchange 2023: Akamai’s Dave Zukowski on ‘competing together’ to achieve zero trust

Read more
Getty Images/iStockphoto/NicoElNinozero trust, Cybersecurity IT engineer working on protecting network against cyberattack from hackers on internet. Secure access for online privacy and personal data protection. Hands typing on keyboard and PCB

Identity management, automation a common theme among 4 agencies’ move to zero trust

Read more

DoD Cloud Exchange: Akamai’s Dave Zukowski on knowing when to transform

Read more
Jay Bonci, Air Force CTO

Top priorities for the Air Force’s new chief technology officer

Read more

Executive Briefing Series: Identity and Access Management

In this exclusive executive briefing, IT security professionals address the federal approach to identity management and zero trust.

Read more

DoD strategic IT survey

Federal News Network reached out to specific DoD IT leaders – for this Defense Department Strategic IT Survey – with precise questions about how they are…

Read more

Protecting the U.S. from hackers – June 22, 2019

Hosted by Dr. Richard Shurtz and Jim Russ. Sponsored by Stratford University. As tensions in relations. rise, the Iranians are increasing their hacking attacks on U.S. targets. And we meet the mathematician and entrepreneur who co-founded Akamai Technologies.

Read more