Ensuring Cybersecurity with IT Modernization?

Ensuring Cybersecurity with IT Modernization?

Date: May 1, 2019
Tags: , , , ,

As Federal Government Modernizes How does it Stay Secure? Keplinger Responds to Fed Scoop

In a recent interview with Fed Scoop, T-Rex CTO, Jason Keplinger shares his perspective on the strong tie between cybersecurity and IT Modernization. Cybersecurity is now able to be done in a thoughtful and integrated way – and not just as a “bolt-on” when doing IT Modernization. Security compliance is important but with limited resources, threat modeling is an important first step. Also automating threat intelligence into your system making it faster to ingest helps with response and protection.

Listen to Part 3 of his interview:


recently posted
Zero Trust Lift: Network Visibility and Analytics Maturity using Zeek

Zero Trust Lift: Network Visibility and Analytics Maturity using Zeek

Zeek is a proven open-source network visibility and analytics tool that you can leverage to increase your agency’s Network Visibility and Analytics Capability maturity under CISA’s Zero Trust Maturity Model Version 2. Zeek (https://zeek.org, formerly named Bro) is a network […]

T-Rex is Hiring at Hill Air Force Base

T-Rex is Hiring at Hill Air Force Base

Since 2016, T-Rex has been supporting large scale hybrid-cloud migrations and systems modernization, to include the successful deployment of the first-ever online U.S. Census in 2020. We are excited about expanding our IT Modernization services within the National Security market, […]

Secure by Design and Zero Trust: Integrating Supply Chain Risk Management with DevSecOps

Secure by Design and Zero Trust: Integrating Supply Chain Risk Management with DevSecOps

Agencies are seeking innovative ways to mature their Zero Trust posture. In this article, we have focused on improvements to your DevSecOps to increase maturity in two pillars: 1) Devices and Applications and 2) Workloads.

Protecting Government Apps and Workloads from Zero-Day Cyber Threats

Protecting Government Apps and Workloads from Zero-Day Cyber Threats

In April 2023, CISA released Zero Trust Maturity Model Version 2, which added a fourth security maturity level and reaffirmed application and workload cyber requirements. In this article we consider Application Threat Protections security levels within the Applications and Workloads […]