Embracing the Cybersecurity Framework
By offering a flexible approach to cybersecurity, the CSF allows agencies to create individualized risk-management plans based on their specific needs and capabilities.
By offering a flexible approach to cybersecurity, the CSF allows agencies to create individualized risk-management plans based on their specific needs and capabilities.
There are four main stages of software evolution – development, testing, deployment and monitoring. To ensure every application at your agency is secure, you must ingrain security in each cycle of development, no matter what process management approach your agency uses to create applications.
Three county leaders explained how they’ve responded to various disasters with the assistance of geographic information system (GIS) technology.
How can government ensure effective security for cloud? Cloud security is a shared responsibility between the cloud provider and the agency.
A new approach could significantly change the way agencies think about security for the better by establishing a design concept around security.
The city government of San Diego serves 1.4 million residents by using GIS as a core technology. The city adopted GIS 30 years ago.
The federal government announced a new initiative on Friday that moves shared service missions into central offices to standardize purchasing.
GovLoop highlights some of the more interesting and exciting opportunities available on USAJobs.com in a blog post each week.
As agencies set up security gateways and protections to guard against external hackers, the biggest threats might come from inside of the organization.
SD-WANs differ from traditional wide area networks (WANs) by separating the networking hardware and the mechanism for controlling it across vast distances.