Hubbard Radio Washington DC, LLC. All rights reserved. This website is not intended for users located within the European Economic Area.
As many agencies begin to test and pilot RPA tools, there is plenty of important factors to keep in mind and obstacles to avoid.
Federal News Network and NEC Corporation of America assembled a panel of federal facial recognition expert to discuss the newest trends.
As the need for continued integration of data and technology drives toward better decision making, agencies need to consider how they design, implement and utilize tools in support better financial management.
In the IT modernization strategy, OMB says EIS provides access to managed security tools and services, help small and micro agencies access new capabilities and consolidate acquisition of these telecommunications and security services.
“The government doesn’t have a monopoly on threat intelligence in this space.” That’s what Tonya Uggoretz, the director of the cyber threat intelligence integration center, said quite profoundly back in April.
The Internet of Things is changing the computing landscape across the government. From mobile and wearable devices to smart sensors in buildings to drones sending back a volume and veracity of data like never before.
Participants in a recent Federal News Radio panel discussion explored how the threat environment is changing and how federal agencies are tying together data from what’s going on with strategies for stopping threats before they turn into damage or pilfered data.
Over the last eight years since the cloud-first policy, one thing has become clear success in moving to the cloud depends mainly understanding what applications you have today and rationalizing them for the future.
In modernizing the IT systems that support these and a myriad of other processes, agencies are trying to introduce a new a new level of automation that incorporates data analysis, improved business processes, and greater cybersecurity and privacy controls.
What can agencies do to move beyond the “post and pray” approach and develop strategies that are proactive, strategic and data driven?
The adoption of a hybrid cloud model leads agencies down the path of creating an approach to security that is based on the zero trust model, where identity management helps define who has access and how that access is defined to specific data and applications.
Cloud is transforming the workplace by letting us view the concept of work in a much different manner. The tools have become smaller from smartphones to tablets, and software is running our lives. Some estimate that by 2020, 25 percent of all software will be in the cloud as-a-service.
Given the edgeless nature of modern networks, and the need to limit trust and access of both external and internal users, more and more IT leaders are recognizing the need to replace yesterday's authentication and access.
To have high assurance of successful cloud implementations, agencies must constantly re-evaluate their security foundations.