Jim Kovach

Jim Kovach

Mobile Security Specialist, Public Sector

NCCoE Guide on Zero Trust Architectures: Draft Released

iOS & Android
4 minutes
Jul 08, 2022
For some time now, security teams have been contending with a fundamental shift: the erosion or complete disappearance of a security perimeter. When
Read Full Post

Zimperium Joins NIST Project on Zero Trust Architectures

MTD
2 minutes
Feb 16, 2022
Zimperium has been working closely with the National Cybersecurity Center of Excellence (NCCoE) at the National Institute of Standards and Technology
Read Full Post

Mobile Threat Defense for OMB Memorandum M-22-09

MTD
9 minutes
Feb 09, 2022
OMB Memorandum M-22-09: Moving the U.S. Government Toward Zero Trust Cybersecurity Principles. On January 26, 2022, the Office of Management and Budget
Read Full Post

NSA Reports Rise in Publicly Known and Active Wi-Fi Attacks

Zimperium
6 minutes
Aug 25, 2021
The United States National Security Agency (NSA) recently released a Cybersecurity Information Sheet, “Securing Wireless Devices in Public Settings,”
Read Full Post

Zimperium Announces Government User Group

Zimperium
3 minutes
Aug 12, 2021
The modern public sector organization faces an increasingly sophisticated array of cyber threats, putting critical data and infrastructure constantly at
Read Full Post

The President’s Executive Order on Cybersecurity is a Massive Shift for Security

Zimperium
8 minutes
May 24, 2021
The latest ransomware attack on Colonial Pipeline highlights the worst secret in cybersecurity; our nation’s critical infrastructure is not prepared to
Read Full Post

NIST’s Guidelines to Improving BYOD Mobile Device Security and Privacy

iOS & Android
2 minutes
Mar 18, 2021
Over the last several months, Zimperium has been working closely with the National Cybersecurity Center of Excellence (NCCoE) at the National Institute of
Read Full Post

CISOs and CIOs: Protecting Traditional Endpoints Isn’t Enough

MTD
2 minutes
Dec 16, 2020
As government cyber teams feverishly perform damage control from the SolarWinds hack, one major question for CISOs and CIOs cannot be ignored: “Protecting
Read Full Post