Enforcing Good Information Security Habits
Agencies with evidence of robust IT controls are more likely to possess the hallmarks of strong IT security environments.
Agencies with evidence of robust IT controls are more likely to possess the hallmarks of strong IT security environments.
Sometimes, all questions aren’t great questions when it comes to implementing a strong cybersecurity posture in government.
To fully understand their threat environment, agencies need to leverage threat intelligence to develop real-time cyber situational awareness.
Managing security risks and developing next-generation software often feels like competing priorities in government.
Ohio CIO Ervan Rodgers is optimistic about his state’s future. Gazing into the proverbial crystal ball, Rodgers imagines Ohio’s technology and workforces reaching new heights in 2020 and beyond.
Before emerging technologies can transform an agency, the data has to be standardized, accessed and shared, directed by organizational guidance.
According to a 2018 survey, 80% of IT decision-makers migrated applications back from the public cloud. Why? During GovLoop’s recent online training, experts weighed in.
With so many disconnected systems spread across a complex network, how can security teams achieve the level of visibility they need? The answer lies in applying automation and orchestration to government networks.
Some level of CMMC will be required for any organization bidding on a DoD contract. Here’s what vendors can do to make sure they are ready.
Has your agency successfully embraced DevOps or maybe is in the process of doing so? DevOps is a project management methodology that solves the problematic product handoff between developers and operations staff. Instead of operating in silos, both teams collaborate on a project from start to finish. Fully embracing DevOps can make an agency moreRead… Read more »