During an interview with GovLoop, Rear Adm. Danelle Barrett described the Navy’s cybersecurity challenges while modernizing its networks.
Dempsey Hackett shared what other agencies can learn from the Defense Logistics Agency’s network modernization moves. DLA manages the global supply chain for the entire U.S. military.
Identity and access management (IAM) is not just about doing security to comply with government requirements. Instead, it’s a means to ensure the consistency and trustworthiness of government services, especially as digital options expand.
To date, there has been minimal focus and attention on addressing the largest culprit of poor acquisition outcomes: inadequate requirements definition.
The demand for digital products and services is creating more IT projects for federal, state and local agencies nationwide.
Several employees across different levels of government suggested one of those primary departments that proves to be a roadblock is IT.
The Trusted Internet Connections (TIC) program launched in 2007 to protect the security of federal network connections governmentwide.
Box’s cloud-based platform for LEISP tightened DOJ’s control over the agency’s data access and governance, and enabled initimate partner collaborations.
These numbers illustrate the growth of DevSecOps and set the context for why this practice is important for governments at all levels to implement.
AI and ML can rapidly detect gaps or abnormalities on agency networks, and respond with a programmed, precautionary or reactionary action immediately.