author:


Security

Giving SIEM Tools a Role in Your IT Security Operations


While there is no one single solution to guard agencies against all cyberthreats, there are tools that can certainly go a long way toward managing and understanding the cyberthreat landscape. One such tool is Security Information and Event Management (SIEM) software. SIEM tools combine …


author:


Security

Information Security: Defense-in-Depth Style


Ladies and gentlemen, we’ve reached the fifth and final post of this information security in hybrid IT series. I hope you’ve found as much value in these posts as I have in your thoughtful comments. Thanks for following along. Let’s take a quick look back at …



author:


DevOps

Assessing Your Agency’s Cloud Readiness


A recent report regarding the modernization of Federal Information Technology (IT), coordinated by the American Technology Council (ATC) in 2017, called for agencies to “identify solutions to current barriers regarding agency cloud adoption.” Couple the report with the White House draft release of a …




author:


DevOps

How to Prevent Lock-In for DevOps Tooling


We’ve talked about a lot in this series about DevOps tooling: Start Your DevOps Journey by Looking at the Value You Add Why Choosing a One-Size-Fits-All Solution Won’t Work How to Choose the Right Tools in Your DevOps Toolchain How to Prevent Tool Sprawl …


author:


Security

Tips for Building a Battle-Hardened Network


The U.S. Army is leading the charge on the military’s multidomain battle concept—but will federal IT networks enable this initiative or inhibit it? The network is critical to the Army’s vision of combining the defense domains of land, air, sea, space and cyberspace to …