Moving to the cloud is one way agencies are transforming. But as different instances of cloud get set up across agencies, siloes are created, and a holistic approach to security can become nearly impossible.
Government security personnel need to shift their thinking from “tough, battle-hardened” warriors, to knowing how to simply “make our beds”. What does that look like? The following processes are rooted in security basics, but need not be complicated.
To find out more about the risks of insider threats, check our new GovLoop Academy course, A Layered Approach to Insider Threat Prevention. This blog post is an excerpt from the course. Insider threats are dangers that originate within an organization, and they’re one of the biggest hazards that agencies face. They can come in allRead… Read more »
Ransomware is a malicious software that freezes computers and computer-controlled equipment until the victim pays a ransom to the executor.
If you want to know more about the Federal Data Strategy, look to an act that passed in 2018 on evidence-based policymaking.
The first responders who do the critical work of alleviating threats to the public have to balance two separate interests that are often at odds.
GovLoop and AWS partnered to highlight what secure cloud vendors have to offer agencies that want to take a mission-focused approach to cloud adoption.
It’s been 20 years since the Global Positioning System (GPS) changed the game for civil, military and intelligence communications. Today, the secret sauce in GPS-enabled solutions is Positioning, Navigation, and Timing (PNT) information.
Automation speeds up service delivery while reducing human error, helping governments protect sensitive information while completing their missions.
One of the ways federal agencies are modernizing their systems is by equipping staff with cloud computing capabilities.