Mapping the Cyber Threat Landscape
Cyber threats are so varied and always evolving. Here is a look at the current threat landscape, based on recent cyber-related news and events.
Cyber threats are so varied and always evolving. Here is a look at the current threat landscape, based on recent cyber-related news and events.
Securing IT systems can be a herculean task. The state of Oklahoma found a way to do it: Officials used a zero-trust cybersecurity model.
There may not be a large organization in existence that hasn’t experienced the repercussions of shadow IT.
Several employees across different levels of government suggested one of those primary departments that proves to be a roadblock is IT.
If you wander into the new IT landscape and need orientation, you’re not alone. How do we navigate this new environment so that we can get the programs we need? Let’s connect the dots.
I just wish IT would embrace shadow IT a little more.
According to Jose Simonelli and Ian Tewksbury, Architects for Red Hat Consulting, shadow IT doesn’t have be a negative thing. In fact, embracing shadow IT can actually have a positive impact on your organization’s culture and processes.
No matter how hard you try, there’s no escaping tech jargon. To help you stay in the know, GovLoop identified and defined a handful of tech terms government employees should know, or at least get used to hearing.
This interview is an excerpt from our recent guide, The Future of Cybersecurity, which examines 15 trends transforming the way government safeguards information and technology. Increasingly, consumers want to bring their own technology solutions and devices into the workplace. However, “shadow IT” – unauthorized devices used within the workplace without the knowledge of the ITRead… Read more »