The Marine Corps needed new mobile training systems with technology that could facilitate modernization of aged logistics processes and procedures.
Posts By John Monroe
The goal is to ensure resilience by creating an operational environment that won’t be disrupted by whatever the next crisis might be.
In response to the shift to remote work, many cyber experts recommend a zero-trust approach to network access to keep agencies’ networks secure.
In theory, a cloud-based security solution should provide the necessary flexibility and scalability. However, many so-called cloud solutions were not designed for the cloud but instead retrofitted for it, relying on script languages to provide automated capabilities.
A technology-centric approach to cybersecurity is essential, but not sufficient. The nation’s recent history of data breaches, many of which began with phishing attacks, suggests that agencies need to take a people-centric approach as well.
Any discussion about improving the security of the federal IT enterprise sooner or later comes around to the topic of network visibility.
The federal government’s sudden, widespread transition to a remote work environment has highlighted the importance of its decision to make policy decisions that remove barriers to cloud adoption.
Identity and access management is essential to modern cybersecurity. As agencies transform their IT environments through the adoption of cloud solutions, they need to ensure they can easily manage which users have access to which applications and data
By integrating OT and IT systems, agencies can create a flow of data from the enterprise out to the edge and see greater insights into their operations.
As federal agencies accelerate their effort to move data, applications and services to the cloud, they often run into an obstacle: Their existing cyber policies and processes were developed with a physical IT infrastructure in mind, not the virtual infrastructure that is the basis of so many modern solutions.