Agencies are concerned with the security of the data traversing on-premise, hybrid and cloud environments. In this interview, we learned how an end-to-end cloud security environment can be applied.
As the volume of data increases every day, government will need new and innovative ways to identify, prioritize and, most importantly, secure their data.
In a recent GovLoop online training, panelists explained how agencies can enhance security, data analytics and speed through the cloud.
We’ve previously talked about adopting the CSF and identifying your most valuable assets and data. Now it’s time to discuss the next phase, Protect, which ensures that data at rest and in transit is secure.
The future of government will almost certainly be on the cloud, and as it turns out for cybersecurity, that’s a very positive reality.
Requirements like FedRAMP have greatly boosted consistency and security of government cloud, and they’ve laid a strong foundation for future migration.
When you think about threats to government cybersecurity, you might think about hackers clicking away at code in dark spaces, well outside of agency walls. While these external threats certainly exist, it’s also critical for agencies to confront insider threats.
Agencies must ensure they’re properly defining network boundaries and automating security processes where possible to keep pace with evolving threats.
What’s happening in the world of cybersecurity?
In a recent interview with Paul Parker, Chief Technologist – Federal and National Government at SolarWinds, and Don Maclean, Chief Cybersecurity Technologist for DLT Solutions, we asked what it took to adopt a risk-management approach to cybersecurity