Innovation and security are two words you usually don’t hear in the same sentence — especially in government. But GovLoop heard from several agencies that are reaping the benefits of innovative technologies like cloud, while making security a priority.
Posts Tagged: Security
Threats to critical infrastructure come in every shape and size. Physical threats from malicious actors and environmental instability are always concerns, while threats in cyberspace are mounting every day. Add onto those risks the fact that government funds are diminishing while critical assets are aging, and the challenge of maintaining security can seem overwhelming.
I get asked about software-defined networks (SDN) quite often and at this point I sort of expect that most people have no idea what it means. Yeah they can explain that SDN stands for Software Defined Networking, but then they quickly go on a rant explaining the virtues of OpenFlow and how managing physical switches… Read more »
This can be accomplished with data-centric security that protects data as it is captured, processed and stored across a variety of devices, operating systems, databases, platforms and applications.
“Agencies must keep in mind that applying security measures to digital content must be easy, and that’s where automation helps.” —John Landwehr
IoT provides a number of potential benefits for the federal space, but risks remain. There’s a long road ahead, but with stronger authentication methods, education and industry collaboration, the federal government could thrive in the IoT revolution.
To be a successful, fully digitized agency, security must be a top concern. Read on for the top three useful tools you can implement to achieve a secure, digital government.
If you’ve already begun investing in cloud services, or doing the due diligence to select the right cloud, it may be time for a check-up to make sure your investments not only support your needs today, but will continue to scale into the future.
Have you ever wondered what your Chief Information Officer is thinking about all day? What keeps them up at night? What makes them excited to go to work? What makes them want to pull their hair out? We found out.
Security or convenience is no longer an acceptable trade-off when it comes to cybersecurity. They must be mutually inclusive, otherwise employees will circumvent security for their own personal convenience. NIST and Microsoft understands this to a degree, but in the latest NIST Password Guidelines SP 800-63-3 the recommendations favors password convenience over password security.