Subscribe

DevSecOps
Last month, ICIT sponsored an online panel discussion featuring a number of application development and cybersecurity experts from across industry, the federal government, and the Department of Defense. This panel discussion focused on two new security vectors that have arisen as application development practices and technologies have evolved – infrastructure as code (IaC) and APIs.
DevSecOps
Article originally posted by the GovDevSecOpsHub here. Today’s Application Security (AppSec) measures focus on protecting web applications. These measures include methods of preventing data or code within the application from being compromised or hijacked. AppSec is an essential part of the Software Development Life Cycle (SDLC) and ensuring that applications are secured must be a top priority in today’s ever-evolving and expanding digital landscape.
Cybersecurity, DevSecOps
Article originally posted to the GovDevSecOpsHub here. When in-person processes became impossible during the pandemic, the extent to which public sector services relied on them became apparent. Town halls, municipal offices, schools, and colleges were forced to close their doors to the public, and the need to provide digital alternatives to citizen services so that constituents could continue to access them became clear.
Cloud, DevSecOps
Article originally posted to the GovDevSecOpsHub here.
Cybersecurity
Zero Trust may seem like a daunting security architecture to implement. But Zero Trust is more a change of mindset towards cybersecurity than it is new tools and solutions. Zero Trust is a concept that can help you simplify and strengthen your defenses by adopting “never trust/always verify” principles. The truth is you probably already have many of the tools you need to get started. In addition to using existing security solutions, new tools and technologies can be added incrementally.
Big Data & Analytics, Channel Partners, Digital Design
Does your business have a single source of truth when it comes to data sharing across facilities? Ensuring data is accurate, relevant, and structured is something any business can recognize as important, yet it is more difficult to achieve than most realize. Just because you are use an integrated workplace management system (IWMS) or have relevant GIS data doesn’t mean it provides a single source of truth.