GCN: Protecting Critical Internet Infrastructure From IoT Device Risks

As the infiltration of internet-connected devices into nearly every aspect of daily life continues to expand, so do the vulnerabilities and security risks they create for their operational networks. That includes the devices and networks used by federal agencies that…

Keeping Your Agency Secure in the Cloud

Like it or not, no government is permanently safe from cyberthreats. The agencies that protect their citizen data the longest are the ones that best assess the risks facing them daily. It’s a situation that doesn’t change after organizations adopt…

A Bridge to the Cloud

For federal agencies, the move to the cloud can be a daunting task. CIOs face an array of challenges in making the transition — from worries about data security, to concerns for budget and resources, the task requires a concerted…

GCN: Securing Data in the Cloud Requires Planning, Constant Vigilance

Government agencies know -- and have largely accepted the fact -- that moving to the cloud is inevitable. Where many start struggling is with the “how.”  How do they move legacy systems to the cloud? How do they choose the…

TechTarget: IBM Business Partners Mull Benefits, Risks of Red Hat Acquisition

IBM business partners have begun recalibrating strategies in the wake of the vendor's announcement that it would acquire open source software vendor Red Hat. IBM, which plans to purchase Red Hat for $34 billion, sparked a wildfire of questions this…

NextGov: It’s Time to Tackle the Problem of Unapproved Cloud Apps to Keep your Agency Secure

It’s a problem seen across all federal agencies: Employees are using cloud-based applications that aren’t approved or protected by IT teams. These apps range from sharing tools, such as cloud storage platforms, to social media sites or personal email accounts…