To find out more about the risks of insider threats, check our new GovLoop Academy course, A Layered Approach to Insider Threat Prevention. This blog post is an excerpt from the course. Insider threats are dangers that originate within an organization, and they’re one of the biggest hazards that agencies face. They can come in allRead… Read more »
Posts Tagged: carahsoft
Government websites on average now handle more than 20 million users daily, with about 48 percent of traffic on federal websites coming from mobile devices.
Agencies should adopt a layered security approach that combines access, identity and security event management to detect and disrupt insider threats before damage is done.
The Department of Defense created Comply to Connect (C2C) as a way to secure its growing array of network endpoints. Let’s discuss how that works.
The common trait insider threats have is their access to an agency’s internal data, IT infrastructures and security practices.
With the direction that government IT has been headed, it seems like every agency is fighting to get into the cloud. But how can an agency know if the cloud is actually right for them? And how can they make sure that they are as cost-efficient as possible while trying to take those next steps?
Government organizations at all levels are increasingly adopting agile development approaches like DevOps. Not only do these iterative, collaborative processes speed up delivery times for critical digital services and applications, they also meet unique public sector needs.
Agencies recognize that modern analytics is imperative. But to harness these capabilities, they need platforms that support real-time decision-making.
One of the current driving forces in federal IT is virtualization, or the separation of an application from the hardware it runs from the underlying operating system. Learn how virtualization can help your agency adapt to evolving requirements and optimize current computing capacity.
When assessing the results of a recent GovLoop survey of federal, state and local government employees, several important takeaways stand out that, when combined, paint an interesting picture of the state of anti-fraud technology today in the public sector.