A Chill Wind Blows

June 02, 2016

Donald Trump, a man who tosses the truth around with the callous disdain of a spoiled child with a toy he has outgrown, has spent much of his campaign calling the media dishonest, even though his manipulation of the media is the only reason he’s the last Republican standing.

Spotlight

In 2005, the Washington State Legislature passed the Homeless Housing and Assistance Act which outlined several bold policies to address homelessness. The Act also required the Department of Commerce (Commerce) to develop a strategic plan which was first submitted in 2006. This is the fourth update to the Washington State Homeless Housing Strategic Plan (Plan) which includes a statewide vision that directs our efforts and resources to ensure that people have a safe place to live. The Plan’s guiding principles and goals support the state’s homeless housing policies and funding so that Commerce, contracted local governments, service providers, and partnering agencies have clear expectations and benchmarks to guide this important work.

Spotlight

In 2005, the Washington State Legislature passed the Homeless Housing and Assistance Act which outlined several bold policies to address homelessness. The Act also required the Department of Commerce (Commerce) to develop a strategic plan which was first submitted in 2006. This is the fourth update to the Washington State Homeless Housing Strategic Plan (Plan) which includes a statewide vision that directs our efforts and resources to ensure that people have a safe place to live. The Plan’s guiding principles and goals support the state’s homeless housing policies and funding so that Commerce, contracted local governments, service providers, and partnering agencies have clear expectations and benchmarks to guide this important work.

Related News

CYBERSECURITY

U.K. Firms Adapting Security Strategies for Cloud, Resilience

ISG | September 06, 2022

Enterprise security leaders in the U.K. are focused on cloud security, building up resilience against threats and aligning cybersecurity strategies with overall business goals, according to a new research report published today by Information Services Group (ISG) (Nasdaq: III), a leading global technology research and advisory firm. The 2022 ISG Provider Lens™ Cybersecurity — Solutions and Services report for the U.K. finds these objectives are the top priorities for chief information security officers (CISOs) in U.K. organizations. The growing use of cloud models such as infrastructure-as-a-service (IaaS) and platform-as-a-service (PaaS) is forcing companies to adapt their cybersecurity approaches, with a focus on holistic resilience that requires more communication and training for employees and outside stakeholders, the report says. “British enterprises are aligning cybersecurity with IT trends and the changing threat landscape, Cloud migration has many benefits but can create new security challenges. To guard against those threats, fundamental technical and organizational measures are needed.” -Roger Albrecht, co-lead, ISG Cybersecurity. The U.K. government has recognized the importance of cybersecurity and is making major investments to protect British enterprises and foster a growing cybersecurity industry, ISG says. According to a 2022 study by the U.K. National Cyber Security Centre, 39 percent of businesses in the U.K. had experienced a cybersecurity breach in the past 12 months, and for large and midsize companies, the average cost of a breach is £19,400. The government’s cybersecurity strategy is now kicking off its fourth year with an emphasis on boosting the U.K. digital economy, which includes about 1,400 cybersecurity businesses, ISG says. As enterprises in the U.K. face increasing IT complexity, the establishment of permanent hybrid work and the need for more agility, many are considering the zero-trust (ZT) security model, ISG says. This approach, which requires verification of any device on any network to access enterprise resources, can reduce security cost and risk exposure through uniform security across an organization. “Zero-trust is a major change that affects many aspects of enterprise security, Experienced service and solution providers can help companies implement and operate a ZT environment.” -Jan Erik Aase, partner and global leader, ISG Provider Lens Research. The report also explores other cybersecurity trends in the U.K., including high demand for technical and strategic security services, a shortage of skilled workers and concerns over increasingly tight data protection laws. The 2022 ISG Provider Lens™ Cybersecurity — Solutions and Services report for the U.K. evaluates the capabilities of 95 providers across seven quadrants: Identity and Access Management (IAM), Data Leakage/Loss Prevention (DLP) and Data Security, Advanced Endpoint Threat Protection, Detection and Response (Advanced ETPDR), Technical Security Services, Strategic Security Services, Managed Security Services – Large Accounts and Managed Security Services – Midmarket. The report names IBM as a Leader in five quadrants. It names Accenture, Atos, Broadcom, Capgemini, Deloitte, HCL and Wipro as Leaders in three quadrants each. Microsoft, Orange Cyberdefense and TCS are named as Leaders in two quadrants each. BT, Check Point, Claranet, CrowdStrike, Darktrace, DXC Technology, EY, Forcepoint, HelpSystems, Herjavec Group, Netskope, NTT, Okta, PwC, RSA, Sophos, Tech Mahindra, Trellix, Trend Micro and VMware Carbon Black are named as Leaders in one quadrant each. About ISG Provider Lens™ Research: The ISG Provider Lens™ Quadrant research series is the only service provider evaluation of its kind to combine empirical, data-driven research and market analysis with the real-world experience and observations of ISG's global advisory team. Enterprises will find a wealth of detailed data and market analysis to help guide their selection of appropriate sourcing partners, while ISG advisors use the reports to validate their own market knowledge and make recommendations to ISG's enterprise clients. The research currently covers providers offering their services globally, across Europe, as well as in the U.S., Canada, Brazil, the U.K., France, Benelux, Germany, Switzerland, the Nordics, Australia and Singapore/Malaysia, with additional markets to be added in the future. About ISG: ISG (Information Services Group) (Nasdaq: III) is a leading global technology research and advisory firm. A trusted business partner to more than 800 clients, including more than 75 of the world’s top 100 enterprises, ISG is committed to helping corporations, public sector organizations, and service and technology providers achieve operational excellence and faster growth. The firm specializes in digital transformation services, including automation, cloud and data analytics; sourcing advisory; managed governance and risk services; network carrier services; strategy and operations design; change management; market intelligence and technology research and analysis. Founded in 2006, and based in Stamford, Conn., ISG employs more than 1,300 digital-ready professionals operating in more than 20 countries—a global team known for its innovative thinking, market influence, deep industry and technology expertise, and world-class research and analytical capabilities based on the industry’s most comprehensive marketplace data.

Read More

CYBERSECURITY

Forescout Joins CISA’s Joint Cyber Defense Collaborative

Forescout | August 12, 2022

Forescout Technologies Inc., the global leader in automated cybersecurity, today announced it has joined the Joint Cyber Defense Collaborative (JCDC) to further support the U.S. government’s focus on the cybersecurity and resilience of its industrial control systems and operational technology (ICS/OT). Established by the Cybersecurity and Infrastructure Security Agency (CISA), JCDC connects cyber defenders to enable critical thinking and planning against cyberattacks. “It’s an honor to be included in the newly expanded JCDC-ICS to share Forescout’s leadership and deep expertise in ICS/OT security, Having worked directly with CISA for years, I know this type of collaboration between industry leaders in cybersecurity is exactly what our nation needs to protect against cyberattacks that threaten critical infrastructure systems on which our daily lives depend.” -Tim Jones, Forescout’s US Federal Government VP of Systems Engineering. Forescout’s cybersecurity solutions are used by many of the world’s largest utilities, governments, and other critical infrastructure providers. Forescout is committed to enhancing the cybersecurity posture of the critical infrastructure community with dedicated OT solutions and through OT-specific research from Forescout’s Vedere Labs, which has disclosed over 50 OT vulnerabilities in the past month alone. Further, Forescout is a founding member of the OT Cyber Coalition, the central aim of which is to enhance resiliency of our nation’s critical infrastructure. JCDC-ICS will build on the existing platform of the JCDC by taking advantage of the knowledge, visibility, and capabilities of the ICS community to improve the protection and defense of control systems, inform U.S. government guidance on ICS/OT cybersecurity, and contribute to real time operational fusion across private and public partners in the ICS/OT space. More information about CISA’s work with the ICS community is available at www.cisa.gov/ics. About Forescout: Forescout Technologies, Inc. delivers cybersecurity automation across the digital terrain, maintaining continuous alignment of customers’ security frameworks with their digital realities, including all asset types- IT, IoT, OT, IoMT, and cloud environments. The Forescout Continuum Platform provides complete asset visibility, continuous compliance, network segmentation and a strong foundation for Zero Trust. For more than 20 years, Fortune 100 organizations and government agencies have trusted Forescout to provide automated cybersecurity at scale. Forescout arms customers with data-powered intelligence to accurately detect risks and quickly remediate cyberthreats without disruption of critical business assets.

Read More

CYBERSECURITY

PC Matic Achieves FedRAMP Authorization

PC Matic | July 27, 2022

American-based cybersecurity firm, PC Matic, announced it has received authorization from the Federal Risk and Authorization Management Program (FedRAMP) for its federal application execution control solution, PC Matic Federal. PC Matic's Authorization to Operate (ATO) is at the moderate impact level through partnership from the U.S. Small Business Administration (SBA). With the full authorization milestone now achieved, PC Matic Federal joins a small and elite group of cloud technology companies authorized to sell into the federal marketplace. This designation allows the United States federal government to begin purchasing and deploying the company's patented application execution control technology to endpoints across its respective departments and agencies. Application execution control is also commonly referred to as Application Whitelisting or Application Allowlisting. "Zero trust begins with prevention, As the federal government begins to align its IT infrastructure with Zero Trust Architectures (ZTA) as mandated by the President's Executive Order on Improving the Nation's Cybersecurity, the ability to procure and deploy application execution control solutions is mission critical. With our authorization fully approved, PC Matic Federal is now well-positioned to assist the federal government with taking a preventative approach to cybersecurity by enhancing its zero trust architectures." -Rob Cheng, CEO and Founder of PC Matic. PC Matic- It has been granted five patents and is a Technology Partner with the National Institute of Standards and Technology (NIST) and its National Cybersecurity Center of Excellence (NCCoE) Zero-Trust Architecture project. The company was founded in 1999 and pioneered the use of default-deny permit by exception for computer applications. FedRAMP is a government-wide program that provides a standardized approach to security assessment, authorization, and continuous monitoring for cloud products and services. The program enables federal agencies to rapidly adapt from old, insecure legacy IT to mission-enabling, secure, and cost-effective cloud-based technology.

Read More