Federal agencies are moving full steam ahead with cloud adoption — backed by a suite of new policy changes aimed at removing barriers to cloud procurement, security and workforce challenges.
Posts Tagged: cyber
Smart investments today are key to achieving stable footing and maximizing cybersecurity for the future. As you consider the risks and opportunities ahead, artificial intelligence (AI) offers real potential to strengthen cybersecurity operations and defend computer networks.
It’s been 20 years since the Global Positioning System (GPS) changed the game for civil, military and intelligence communications. Today, the secret sauce in GPS-enabled solutions is Positioning, Navigation, and Timing (PNT) information.
To better understand how agencies can successfully leverage DEFEND, GovLoop spoke with Ralph Kahn, Vice President of Federal at Tanium
When you think about threats to government cybersecurity, you might think about hackers clicking away at code in dark spaces, well outside of agency walls. While these external threats certainly exist, it’s also critical for agencies to confront insider threats.
Learn how to most effectively secure all of your agency’s connected devices.
Government must keep pace with accelerating change while supporting a workforce that does not change very fast, according to Maj. Gen. Sarah Zabel. The focus then is how do agencies increase cyber awareness among all employees — even their security experts.
Assuming you’ve already developed a streamlined user interface (UI), it’s time to start centering your attention on the behind-the-scenes processes that will help you build and maintain that connection between governments and citizens.
By: John W. Lainhart and Christopher Ballister In early 2015, George Washington University established the Center for Cyber and Homeland Security (CCHS) – a nonpartisan “think and do” tank. CCHS’ mission is to carry out policy-relevant research and analysis on cybersecurity, homeland security and counterterrorism issues. By bringing together domestic and international policymakers and practitionersRead… Read more »
To be effective in their security efforts, agencies must be proactive — using cyber analytics and cognitive-based systems to develop true security intelligence.