In theory, a cloud-based security solution should provide the necessary flexibility and scalability. However, many so-called cloud solutions were not designed for the cloud but instead retrofitted for it, relying on script languages to provide automated capabilities.
Posts By John Monroe
A technology-centric approach to cybersecurity is essential, but not sufficient. The nation’s recent history of data breaches, many of which began with phishing attacks, suggests that agencies need to take a people-centric approach as well.
Any discussion about improving the security of the federal IT enterprise sooner or later comes around to the topic of network visibility.
The federal government’s sudden, widespread transition to a remote work environment has highlighted the importance of its decision to make policy decisions that remove barriers to cloud adoption.
Identity and access management is essential to modern cybersecurity. As agencies transform their IT environments through the adoption of cloud solutions, they need to ensure they can easily manage which users have access to which applications and data
By integrating OT and IT systems, agencies can create a flow of data from the enterprise out to the edge and see greater insights into their operations.
As federal agencies accelerate their effort to move data, applications and services to the cloud, they often run into an obstacle: Their existing cyber policies and processes were developed with a physical IT infrastructure in mind, not the virtual infrastructure that is the basis of so many modern solutions.
What agencies need is the ability to observe their systems’ performance from end to end in real time – and when a problem arises, to identify its source.
Onondaga County, N.Y., Water Authority began using drone technology to inspect its water tanks, and gathered more information faster and saved costs.
When the COVID-19 crisis forced many federal employees to start working from home, agency IT leaders found themselves in a new environment — employee living rooms. They quickly realized that while their business continuity plans address key issues around connectivity, security at this scale has proven to be something of an afterthought.