The Makpar Blog
![INFOGRAPHIC: AI Infrastructure and Cybersecurity for Government](https://images.squarespace-cdn.com/content/v1/5f15fab5fd73757ac7d6a1b6/1718287261012-75S84C4B3IZ75BCJ18KB/Federal+Government+Cybersecurity+AI.jpg)
![Don’t Be Spooked by Zero Trust Mandates this Halloween ](https://images.squarespace-cdn.com/content/v1/5f15fab5fd73757ac7d6a1b6/1698153622435-TPQD4F853K3AZU7ICFPO/Purple+and+Yellow+Colorful+Horror+Halloween+Costume+Party+Presentation.png)
![Video Podcast: Current State of Zero Trust and Use Cases for Government](https://images.squarespace-cdn.com/content/v1/5f15fab5fd73757ac7d6a1b6/1676479217359-8BCBRMRD33EFL1WNL799/Zero+Trust-hologram.jpg)
![PODCAST: History of Zero Trust and Government (Part 2)](https://images.squarespace-cdn.com/content/v1/5f15fab5fd73757ac7d6a1b6/1656511004635-08NQXL0O72EDRMJIBHTG/Zero+Trust.jpg)
PODCAST: History of Zero Trust and Government (Part 2)
In the following Makpar Cybersecurity Forum podcast interview, Larry Hunt, Director of Business Development at Makpar, discusses the history of Zero Trust and government. This is part two of a two-part podcast series, where Larry highlights changes in information security that bring us to Zero Trust today, as well as advancements in Zero Trust in 2022.
![Infographic: The Top 5 Government Cybersecurity Fundamentals](https://images.squarespace-cdn.com/content/v1/5f15fab5fd73757ac7d6a1b6/1664374507822-N2GGUCUUI9MEAT6RO9IT/CYBERSECURITY+INFOGRAPHIC.jpg)
![A Zero Trust Cybersecurity Primer for Federal Agencies](https://images.squarespace-cdn.com/content/v1/5f15fab5fd73757ac7d6a1b6/1656511004635-08NQXL0O72EDRMJIBHTG/Zero+Trust.jpg)
![Privacy Versus Security: How Government Leadership can Strike the Right Balance](https://images.squarespace-cdn.com/content/v1/5f15fab5fd73757ac7d6a1b6/1644430325927-DZ2PS8IJO6KAHI9J1YX4/GettyImages-621604558.jpg)
![Data Privacy Day 2022: Cyber Trends to Look out for this Year](https://images.squarespace-cdn.com/content/v1/5f15fab5fd73757ac7d6a1b6/1643400861298-H4YJMAZI4R1WE2X1CM53/2022+Cyber+Trends+-+Title+Card-01.png)
![Makpar Cybersecurity Forum Video Podcast: “How to Prevent Being the Victim of the Next Attack”](https://images.squarespace-cdn.com/content/v1/5f15fab5fd73757ac7d6a1b6/1638896706386-5L7CTOWOTII2IR7UGTFI/Thumbnail-01.png)
![Cybersecurity for the C-Suite (C4C) Video Podcast Panel: “Policies for Prioritizing, Simplifying and Executing Government Cyber Strategies”](https://images.squarespace-cdn.com/content/v1/5f15fab5fd73757ac7d6a1b6/1636561871395-HN5KO9BOFXF2OCE1JKRT/C4C+TITLE+CARDS_INTRO+SCREEN+1.png)
![Makpar Cybersecurity Forum Video Podcast: “What’s My Attack Surface?”](https://images.squarespace-cdn.com/content/v1/5f15fab5fd73757ac7d6a1b6/1635954583624-XDCATPP9MZBGUWQO9BP5/Screen+Shot+2021-11-03+at+11.48.52+AM.png)
![Data, Cybersecurity and Digital Services Next Phase for IRS IT Modernization](https://images.squarespace-cdn.com/content/v1/5f15fab5fd73757ac7d6a1b6/1634752580005-1A58AXBVSHRQGQSPD3QG/GettyImages-1197780051.jpg)
![Makpar Cybersecurity Forum Video Podcast: The 5 “Whys” for Stronger Cyber Security Governance at Federal Agencies](https://images.squarespace-cdn.com/content/v1/5f15fab5fd73757ac7d6a1b6/1640100256173-66BH5SBHIVPWSBSTOV7T/5+WHYS+cover+photo-01.png)
![How Federal Agencies Can Meet New Zero Trust Mandates](https://images.squarespace-cdn.com/content/v1/5f15fab5fd73757ac7d6a1b6/1632922801417-U08WPLLEX6WIWMC29M0B/iStock-1311242905.jpg)
![The 5 “Whys” for Stronger Cyber Security Governance at Federal Agencies](https://images.squarespace-cdn.com/content/v1/5f15fab5fd73757ac7d6a1b6/1631115276690-GFTTWVUT0DKRK57JTG2U/iStock-1298133977.jpg)
![PODCAST: The SolarWinds Breach Points to Need for Cyber Fundamentals](https://images.squarespace-cdn.com/content/v1/5f15fab5fd73757ac7d6a1b6/1612973041502-259SYD743MK5BLU5Y8QT/Makpar+podcast+logo-01.png)
![White Paper | In Response to The SolarWinds Breach: The Need to Return to Cybersecurity Fundamentals](https://images.squarespace-cdn.com/content/v1/5f15fab5fd73757ac7d6a1b6/1611781478504-K2074O1QA57D2KDMH7X2/image-asset.jpeg)
![Cybersecurity Best Practices for Federal Agencies, Small/Medium Businesses, and Individuals.](https://images.squarespace-cdn.com/content/v1/5f15fab5fd73757ac7d6a1b6/1603488591764-QOAV64LII6U66IN736BO/cybersecurity_shield_smaller+size.jpg)
![National Cybersecurity Awareness Month 2020](https://images.squarespace-cdn.com/content/v1/5f15fab5fd73757ac7d6a1b6/1608224381936-ILTCP1GTKWMVX04QBMT8/CSAM+Main.png)