government

Tag: government

Three Ways to Help the Digital Air Force Achieve Takeoff

The Digital Air Force Initiative is an effort to leverage data and applications at the edge, along with artificial intelligence and machine learning, to “field a 21st Century infrastructure responsive…

Proactive Security Strategy for the Public Sector (10 Steps, Part Two)

In the first of these two articles, we covered the first five steps public sector organizations should take to change how they think about their cybersecurity to overcome this challenge.…

Proactive Security Strategy for the Public Sector (10 Steps, Part One)

The U.K. public sector holds some of the most important and sensitive data in the country, from private medical records to military intelligence. Consistently protecting this data is a major…

New Laws Alone Won’t Be Enough to Secure IoT Devices

Security concerns over the Internet of Things (IoT) are growing, and federal and state lawmakers are taking action. First, the U.S. Senate introduced the Internet of Things Cybersecurity Improvement Act…

Three Ways the Department of Defense Can Plug Security Holes

An early 2019 report from the Defense Department Officer of Inspector General revealed how difficult it’s been for federal agencies to stem the tide of cybersecurity threats. Although the DoD…

Modernizing Security to Protect Next-Generation Federal Networks

As agencies across the federal government modernize their networks to include and accommodate the newest technologies such as cloud and the Internet of Things (IoT), federal IT professionals are faced…

Army Network Optimization Could Help Training

The U.S. Army is undergoing a major technology shift affecting how soldiers prepare for battle. Core to the Army’s modernization effort is the implementation of a Synthetic Training Environment (STE)…

Dominating and Protecting the Connected Battlefield

“Dominance” and “protection” sum up the Defense Department’s goals as U.S. armed forces begin to modernize their networks and communications systems. DOD is investing significant resources in providing troops with…

Maximize Your Microsoft Ecosystem Performance

Microsoft offers some of its own monitoring options, such as System Center and Windows Admin Center. Federal IT pros can optimize performance by including additional monitoring strategies such as monitoring…

Assessing the Navy’s New Cybersecurity Program

The Navy’s new Combat to Connect in 24 Hours (C2C24) is an ambitious program with the potential to change naval warfare as we know it. The program is designed to…