How can agencies become just as innovative about cyber defense as bad actors are about cyber offense? Zero trust security might be exactly the protection agencies need.
Search Results for: cio
Part 1: Common Tech Pitfalls on Government Teams
In the first of a two-part series, get a brief overview of three tech concepts and some of the common pitfalls encountered when implementing them.
3 Ways to Keep Data Flexible and Available for Optimal Services
To streamline and accelerate delivering robust insights and better services, agencies should look for three capabilities: flexibility, integration and synchronization.
COVID-19 Proved Government Agility. It’s Time to Use That for Tech Skills Gaps
Failing to address the widening tech skills gap is simply not an option. With this in mind, here are four initiatives that federal agencies should prioritize in the months ahead.
Ransomware’s Deadly Turn for the Worse (and What You Can Do About It)
Like lethal strikes carried out by the Serengetti’s deadly predators, ransomware attacks often unfold quickly, stealthily and with great harm to victims. That’s because beasts of prey, whether equipped with claw and fang or malicious malware, exploit a pack’s weakest links. They prey on the careless and the naive, the ones who stray from theRead… Read more »
Meet Our Latest Round of Featured Contributors!
Read on to meet these government and industry contributors for GovLoop who will be posting once a week for the next three months!
Embracing Machine Identity Management
“As government adoption of DevOps increases, there are numerous lessons to take away in terms of automating legacy processes that have many slow and manual interventions detrimental to the success of DevSecOps.”
When Cloud Deployments Stretch Your IT Team’s Bandwidth
When applications are running in a cloud service provider’s environment, there are a lot of other things the government has to worry about.
How to Manage an Efficient and Secure Cloud
To learn about how agencies can manage the enormous data influx and optimize their cloud journeys, an industry expert offered three key practices.
How Security Goes Undercover
Cybersecurity must be integral to the broader solutions that agencies adopt so that it isn’t an afterthought in budget-strained times.