:quality(70)/cloudfront-us-east-1.images.arcpublishing.com/archetype/PVBV55HOFNEORBJLYGOY4Z3SQE.jpg)
:quality(70)/cloudfront-us-east-1.images.arcpublishing.com/archetype/PVBV55HOFNEORBJLYGOY4Z3SQE.jpg)
:quality(70)/cloudfront-us-east-1.images.arcpublishing.com/archetype/FUZPWGGMW5FEPEBNYJS3WRODOY.jpg)
How agencies could utilize $12.7 billion budgeted for cybersecurity
Having centralized secrets management is core to building a zero trust environment.
:quality(70)/cloudfront-us-east-1.images.arcpublishing.com/archetype/P55TLK6NKNGQ7FPT5B3HBU6DYY.jpg)
Cloud
Coast Guard fills cyber skill gaps with all-remote team of volunteers
The Coast Guard, an armed service within the Department of Homeland Security, recruits a volunteer body of more than 20,000 members.
:quality(70)/cloudfront-us-east-1.images.arcpublishing.com/archetype/GF64GL4MIRHERFXJGYOALEABBQ.jpg)
Over-classified information hampers work with allies, top Marines say
“Sometimes we get in our own way, by over-classifying, over-compartmentalizing,” Gen. David Berger said.
:quality(70)/cloudfront-us-east-1.images.arcpublishing.com/archetype/F5OY5JG4Q5AHTAG3EESZ6XCJXM.jpg)
Pentagon close to making first awards on $9 billion cloud contract
The Pentagon in December tapped Amazon, Google, Microsoft and Oracle for its highly anticipated Joint Warfighting Cloud Capability contract.
:quality(70)/cloudfront-us-east-1.images.arcpublishing.com/archetype/2G6KREYCYVH6NLV4FESMZUZXRQ.jpg)
How observability helps federal IT pros work smarter, not harder
Observability goes beyond traditional monitoring to provide proactive insights into problems before they occur.
:quality(70)/cloudfront-us-east-1.images.arcpublishing.com/archetype/B26CTTNGPZFRLB5WVJFVOG55A4.jpg)
Biden vows to wield ‘all instruments’ in fighting cyberthreats
The strategy calls out China, Russia, Iran, North Korea and others for “reckless disregard for the rule of law and human rights in cyberspace."
:quality(70)/cloudfront-us-east-1.images.arcpublishing.com/archetype/T2H62V6BKFHJZGBBAOJADH2I4Q.jpg)
When it comes to network innovation, we must protect the data ‘pipes’
Because encryption has a shelf life, military networks still need to protect the data pipes that support the warfighter.
:quality(70)/cloudfront-us-east-1.images.arcpublishing.com/archetype/OY5PU6NEE5D5XOAE72CE3XV3ZU.jpg)
Data governance holds the key to integrity and security
A logical data fabric architecture enables dynamic and intelligent data orchestration across a distributed landscape.
:quality(70)/cloudfront-us-east-1.images.arcpublishing.com/archetype/WXVIJLL7IBHTZAHBV5NQLHTO4Y.jpg)
Managing security across the new data perimeter
If the network perimeter was like a protective moat that surrounds a castle, the data perimeter is the small houses that dot the landscape.
:quality(70)/cloudfront-us-east-1.images.arcpublishing.com/archetype/ZOHTBWAHHJFXHEO5X7UR3ENXR4.jpg)
Pentagon, intelligence community eye cloud collaboration
The Department of Defense will work closely with the intelligence community as it establishes its cloud infrastructure.
:quality(70)/cloudfront-us-east-1.images.arcpublishing.com/archetype/LT2VVCMIOZE6HH4FWQBJSJRSXY.jpg)
Cloud-friendly Air Force has eyes on Pentagon’s JWCC contract
CTO Jay Bonci said U.S. defense leaders "have to think about cloud as being a part of a resilience baseline."
:quality(70)/cloudfront-us-east-1.images.arcpublishing.com/archetype/4HHTBDEPMVH37L7LGPSJZIIPMI.jpg)
Pentagon, private sector must partner to fight new era of cyberattacks
Over the past six months, there have been 10,666 ransomware variants identified, almost twice the total in the previous six months.
:quality(70)/cloudfront-us-east-1.images.arcpublishing.com/archetype/OAQHOX7RSBCTDMGSH2FTZ6TD4E.jpg)
Workforce gaps may hinder federal IT modernization
For one, telework remains a decisive factor in attrition.
:quality(70)/cloudfront-us-east-1.images.arcpublishing.com/archetype/XXWK2JCWI5HOBDYNXX2477F6NQ.jpg)
DISA’s ‘Gray Network’ faces performance monitoring challenges
Gray networks sit between inner and outer VPN tunnels and provide an extra layer of security for encrypted classified data.
:quality(70)/cloudfront-us-east-1.images.arcpublishing.com/archetype/XP4G46WC7NDEJHQ73I2WTVXF2Q.jpg)
A people-first approach to recruitment, retention at federal agencies
While the private sector has recovered more than 90% of jobs lost over the past two years, the public sector has only recovered 53%.
:quality(70)/cloudfront-us-east-1.images.arcpublishing.com/archetype/GZEB6CJSM5DAPJCJT25RVM6GX4.jpg)
Technical debt: The cybersecurity threat hiding in plain sight
The Biden Administration’s executive order on cybersecurity in May 2021 jump started the movement toward a zero trust architecture.
:quality(70)/cloudfront-us-east-1.images.arcpublishing.com/archetype/XM7ORFR6QREJHKVD2TNVNVUVOY.jpg)
Government-private sector cooperation vital in cyberwar: Senator King
King, who sits on Senate Intelligence panel that investigated Russian interference in the 2016 election, said citizens must develop their media literacy.
:quality(70)/cloudfront-us-east-1.images.arcpublishing.com/archetype/HVZMYQQLQRC6PGOBLK3QBZYEAA.jpg)