In response to the shift to remote work, many cyber experts recommend a zero-trust approach to network access to keep agencies’ networks secure.
Posts Tagged: carahsoft
As federal agencies accelerate their effort to move data, applications and services to the cloud, they often run into an obstacle: Their existing cyber policies and processes were developed with a physical IT infrastructure in mind, not the virtual infrastructure that is the basis of so many modern solutions.
Has your agency successfully embraced DevOps or maybe is in the process of doing so? DevOps is a project management methodology that solves the problematic product handoff between developers and operations staff. Instead of operating in silos, both teams collaborate on a project from start to finish. Fully embracing DevOps can make an agency moreRead… Read more »
The need for risk management in government has grown along with agencies’ digital footprints. As complexity increases, so does vulnerability.
To successfully move forward with IT optimization, your agency needs to focus on three areas: IT automation, infrastructure and storage.
Before your agency can successfully address the 21st Century IDEA, you must understand the scale at which you want to implement any new technology.
To find out more about the risks of insider threats, check our new GovLoop Academy course, A Layered Approach to Insider Threat Prevention. This blog post is an excerpt from the course. Insider threats are dangers that originate within an organization, and they’re one of the biggest hazards that agencies face. They can come in allRead… Read more »
Government websites on average now handle more than 20 million users daily, with about 48 percent of traffic on federal websites coming from mobile devices.
Agencies should adopt a layered security approach that combines access, identity and security event management to detect and disrupt insider threats before damage is done.
The Department of Defense created Comply to Connect (C2C) as a way to secure its growing array of network endpoints. Let’s discuss how that works.