As government relies more heavily on information technology to store, manage and access critical data, it also creates greater potential for that information to be misused or exposed. According to one Government Accountability Office report, the number of cyber incidents in the federal space in 2014 was 12 times higher than it was in 2006.
Search Results for: cio
5 Tips to Turn an Internship into a Full-Time Position
Learn some helpful practices to go from being an intern to a full-time employee.
Don’t Miss These Heavy-Hitting Keynotes at the AWS Public Sector Summit
In addition to having access to more than 80 sessions, attendees will also hear from four heavy-hitting customer keynote speakers with a broad range of IT and leadership expertise both in government and the private sector.
Recipes for Operational Data Success in the Public Sector
Organizational leaders have access to an overwhelming amount of data, and it’s up to them to decide how much to use and when to use it.
How to Say No to Office Housework
It’s never easy to tell your boss “no” and it’s even harder when your reason for refusing is that ask is unconsciously discriminatory. So, how do you say no to those requests without damaging your work relationships or professional reputation?
The Navy’s Approach to Developing Cloud Requirements
The Defense Department has been slower than most government agencies to adopt cloud services. Addressing security concerns in the cloud took some time, but that wasn’t the only holdup.
Dealing With Advanced Persistent Threats
Federal networks and systems today are under unrelenting attack by persistent, sophisticated and resourceful adversaries who operate on behalf of nation states or criminal groups with the aim of stealing sensitive data, causing harm or exploiting federal and military systems.
Embracing FITARA to Drive IT Visibility and Cybersecurity
Under FITARA, the visibility and intelligence that CIOs are expected to have about their agencies’ IT domains will also inform their CISOs about where critical assets exist that require better defenses and where vulnerabilities exist that require remediation.
Layer Security: Secure Applications, Not Just Infrastructure
With application-layer security, applications remain protected even if initial authentication procedures are faulty or circumvented by hackers. Think of it like adding additional protection to your house to keep out intruders, rather than just relying on the fence surrounding your yard. With bars on your windows or an alarm at your front door, you are… Read more »
Mapping Out Your City’s Health
Learn how GIS technology is working with healthcare to transform communities.