Data is the most important asset an organization has, and insider threats can cause up to 34% of data breaches. Find out how you can build a data-centric approach to Zero Trust where the storage management system becomes the segmentation gateway to protect and monitor access of critical data.
A bipartisan group of lawmakers is urging House leaders to include funding for states to modernize their technology infrastructure with an eye to a cloud-first approach, shared services that deliver functionality to cities and towns and some oversight of state technology plans as a condition of receiving funding.
GSA's beta.SAM contracting system modernization is moving ahead, incorporating lessons learned from earlier shift.
The first go-live date for the Cerner health record at a VA facility was delayed first because of readiness problems and then because of COVID-19 pandemic, but an oversight report indicates that infrastructure woes plagued the project almost from the beginning.
The memo notes that CISA will begin issuing reports to agencies highlighting DNS traffic anomalies and could issue a follow up directive as new protections come online.
Navy CIO Aaron Weis wants to rebuild the service's network architecture to look and function more like industry, but acquisition culture and structure slow progress.
The Marine Corps is willing to swap out tanks and cannons for a better, more agile, cloud based network available in the most remote environments.
For decades, PIV and CAC cards have been the primary tools for agencies and contractors to verify the identity of employees and contractors. The COVID-19 outbreak could change that.
Unemployment insurance and other social safety net IT systems around the county are crumbling under the stress of millions of users seeking to apply for benefits in the wake of unprecedented unemployment during the COVID-19 pandemic.
Steve Kelman spotlights a story of smart acquisition hidden behind a doom-and-gloom headline.
Steve Kelman argues that we all should be much more willing to ask for help.
Sign up for our newsletter.
Many vendors lack transparency into their own supply chains. So how can vendors – as well as their government customers — be assured that their sub-tier suppliers do not pose threats or vulnerabilities?
The spirit of the EIS program is modernization, but it seems pressure to meet established timelines may be working counter to that goal.
Despite its critical importance to our national security and everyday lives, GPS is highly vulnerable to attacks and technical errors that have already caused serious disruptions.
More Opinion that Matters