3 Must-Haves for Government Cloud
By taking a strategic approach to multi-cloud management, federal agencies can achieve success in three critical areas of cloud: security, visibility and automation.
By taking a strategic approach to multi-cloud management, federal agencies can achieve success in three critical areas of cloud: security, visibility and automation.
Michael Sherwood discusses a range of tech topics in the latest edition of the GovLoop “CIO Conversations” series.
Agencies are concerned with the security of the data traversing on-premise, hybrid and cloud environments. In this interview, we learned how an end-to-end cloud security environment can be applied.
The future of government will almost certainly be on the cloud, and as it turns out for cybersecurity, that’s a very positive reality.
What’s happening in the world of cybersecurity?
In a recent interview with Paul Parker, Chief Technologist – Federal and National Government at SolarWinds, and Don Maclean, Chief Cybersecurity Technologist for DLT Solutions, we asked what it took to adopt a risk-management approach to cybersecurity
The cyber landscape is rapidly changing. As federal CIOs work to navigate this landscape, it will be critical to use innovative approaches to grow the cyber workforce as well as modernize cyber capabilities.
To learn how organizations leverage the flexibility of cloud without decreasing their security posture, GovLoop sat down with Felipe Fernandez, Director of Systems Engineering at Fortinet Federal. Fortinet Federal provides solutions and services to help agencies build robust cybersecurity.
In this age of rapid technological innovation, organizations face many obstacles to ensuring cybersecurity. The rise of internet-connected devices is just one thing that’s forced agencies to rethink in 2018 how they secure technologies and their related endpoints that operate on their networks.
With today’s headlines abuzz with news about hackers, security breaches, and an unlimited array of online threats, it’s no wonder that achieving a solid network security posture has become a little like the quest for the Holy Grail.