Subscribe

Cybersecurity, DevSecOps
Article originally posted to the GovDevSecOpsHub here. When in-person processes became impossible during the pandemic, the extent to which public sector services relied on them became apparent. Town halls, municipal offices, schools, and colleges were forced to close their doors to the public, and the need to provide digital alternatives to citizen services so that constituents could continue to access them became clear.
Cloud, DevSecOps
Article originally posted to the GovDevSecOpsHub here.
Cybersecurity
Zero Trust may seem like a daunting security architecture to implement. But Zero Trust is more a change of mindset towards cybersecurity than it is new tools and solutions. Zero Trust is a concept that can help you simplify and strengthen your defenses by adopting “never trust/always verify” principles. The truth is you probably already have many of the tools you need to get started. In addition to using existing security solutions, new tools and technologies can be added incrementally.
Big Data & Analytics, Channel Partners, Digital Design
Does your business have a single source of truth when it comes to data sharing across facilities? Ensuring data is accurate, relevant, and structured is something any business can recognize as important, yet it is more difficult to achieve than most realize. Just because you are use an integrated workplace management system (IWMS) or have relevant GIS data doesn’t mean it provides a single source of truth. 
Cloud
In its 2021 State of the Cloud Report, Flexera shared the results of a survey on cloud adoption and migrations across industries and types of organizations. The report confirms that cloud migrations are accelerating rapidly, as IT leaders grapple with the pressure to accelerate their modernizations while managing costs. And the public sector is no exception to this trend.
Cloud, Cloud Computing
As I.T. professionals, security needs to be at the forefront of everything that we do. Even in mature organizations with robust cloud deployments we must always believe there is room for improvement. Here are four considerations to make when evaluating the security of your AWS workloads.   How will you utilize your logging data?