Government Digital Transformation and Modernization in Just Three Easy Steps

The need for modernized information technology at government agencies is long-established, but progress toward transformation is often slow-moving. As recently as 2019, the Government Accountability Office found that 10 critical systems at 10 agencies were eight to 51 years old.…

Joyce Hunter of ICIT discusses building a better federal cyber workforce

On October 14 and October 15, 2020, top cybersecurity experts will be coming together for the ICIT Fall Briefing 2020. This unique cybersecurity event will be a virtual hands-on collaboration project designed to teach government cybersecurity professionals how to crowdsource…

Why machine learning is the right approach for securing multi-platform data environments

The cloud’s scalability, flexibility, and cost savings have federal government agencies replacing some traditional, physical data center infrastructure with cloud services. This also led to the federal “Cloud First” mandate which required agencies to consider available cloud solutions before building…

Leveraging AI and ML to fight back against government cyber threats

This article was contributed by Carolyn Duby, the Solutions Architect and Cyber Security Lead at Cloudera.Gartner anticipates an estimated 300 percent growth in connected devices by 2020 sparked by faster 5G networks bringing an explosion of inexpensive, connected devices. While this…

Why recent cybersecurity legislation is just window dressing

Representative Ro Khanna (D-Calif.) recently introduced cybersecurity legislation that would, “mandate Congress [to] direct OMB to require cybersecurity training for federal employees and include information on the risks of Internet of Things (IoT) devices…” On the surface, this seems like…

Why recent cybersecurity legislation is just window dressing

Representative Ro Khanna (D-Calif.) recently introduced cybersecurity legislation that would, “mandate Congress [to] direct OMB to require cybersecurity training for federal employees and include information on the risks of Internet of Things (IoT) devices…” On the surface, this seems like…

Solid foundations + innovation = stout cybersecurity

Every security professional knows that the adversary has the advantage. We have to find every vulnerability and remediate it, and the enemy only needs to find one vulnerability and exploit it. This asymmetry underlies their economic advantage: finding one vulnerability…