Search Results for: Cloud

Why Application Intelligence Matters to Government

In today’s digital age, federal agencies are increasingly reliant on software applications to meet their missions and deliver improved services to the citizens they serve. IT environments are more complex than ever due to cloud, mobile and virtualization, and that means managing and optimizing application performance can be challenging. Often agencies don’t have the properRead… Read more »

Training – Online

Filed under: Cloud

Meet GovLoop’s Featured Bloggers!

Last month, we put out a call for our eighth round of GovLoop Featured Bloggers – and you responded with amazing enthusiasm. People from all walks of government and industry life sent in great ideas for posts, about everything from technology challenges in city government to using Twitter to monitor food safety in your city…. Read more »

Introduction to DDoS Attacks

Welcome to the GovLoop Academy course on Distributed Denial of Service (DDoS) attacks, where you will learn about what they are and how your agency can prevent and respond to them. By taking this course, you will be enrolled in five lessons about DDoS attacks and how to prevent them. We will explore what DDoSRead… Read more »

Effective Cyber Strategies for a New Threat Landscape

In a recent interview, Anthony Lauro, Senior Enterprise Security Architect at Akamai, a content delivery network and cloud computing services provider, shared how organizations can build new, more effective cybersecurity strategies to combat growing threats.

Data in a Flash – Storage Done Smart

Federal agencies are under great pressure to optimize infrastructure to better support mission performance and resilience. To do that, the engines that power information processing – the federal datacenters – need to leverage innovation to achieve speed, increase security, density and reduce power consumption.

Cook County Takes An Organizational Approach to Cybersecurity

It’s hard to imagine that just a few years ago Cook County, Ill., – the second most populous county in the country – had no centralized management strategy or directive for its various agencies’ IT security protocols and tools. Today, the county has both a central security office within its Department of Homeland Security and… Read more »