Could Blockchain Streamline Government Acquisitions?
If you’re in government work, you’ve probably seen your fair share of articles about blockchain. But who’s using it, and how?
If you’re in government work, you’ve probably seen your fair share of articles about blockchain. But who’s using it, and how?
If government wants to run as efficiently and securely as possible, rethinking data classification, cyber education tactics and modern hybrid cloud solutions are excellent ways to start.
As organizations and citizen users increasingly depend on websites, mobile computing and web-based applications, they become exposed to greater privacy and security risks. Because of the open infrastructure of the Internet and the growing availability of hacking tools, almost anyone can carry out a cyberattack against any organization or user relying on networked applications and… Read more »
How can government find clarity as cybersecurity only grows more complex?
Three main takeaways from the first-of-its-kind government job fair held in Silver Spring on Nov. 6.
The first-of-its-kind hiring fair brought together more than 1,800 job seekers from 40 states, and hiring managers from 33 federal agencies. The ultimate goal is to fill 500 IT and cybersecurity positions governmentwide.
Automation tools like Red Hat’s Ansible — an open source IT configuration management, deployment and orchestration tool — can help agencies turn their security posture from reactive to proactive.
At GovLoop’s Gov Trends Virtual Summit, we heard from Nadav Benbarak, Director of Industry Solutions at Okta, and John Harrington, CSRA’s Chief Architect supporting the Office of the CIO. They explained how identity and access management (IAM) can play a central role in every technology strategy agencies must embrace to modernize.
Incorporating new technologies, such as software-defined networking (SDN) and network function virtualization (NFV), can provide improved network functions, management and operations. There are a number of challenges to achieving digital transformation, but intelligent automation can better enable agencies to adopt SDN and NFV into their infrastructure.
The “Identify” function of the NIST Cybersecurity Framework can be especially helpful in communicating the importance of cybersecurity investments to leaders and ensuring those investments fit into an agency’s security strategy.