Cloud Computing

GAOTaka Ariga, GAO

GAO looking for balance and best practices of identity verification

At GAO’s Innovation Lab, which is designed to be a practioner of new computational capacity, identity verification is a major issue.

Read more
(Amelia Brust/Federal News Network)

Are 2 associations’ questions to GSA about cloud efforts premature or discerning?

Read more
The Coalition for Government Procurement

Multiple-award, generic, governmentwide blanket purchase agreements: Vertical contract duplication

Read more
Cloud computing technology and internet of Things concept, Big data and connection technology

The Army’s Enterprise Cloud Management Office looks to deliver computing resources around the world

Read more

Education Department looking at zero trust to secure bots from being compromised

Read more
Getty Images/iStockphoto/maxkabakov

Shifting security perspectives crucial to preventing next major government breach

Read more
DoD

Army’s new digital strategy looks well beyond nuts and bolts of IT modernization

Read more
.

What’s in a name? For the Department of the Navy, it signifies resolve

Aaron Weis, the Department of Navy’s chief information officer, detailed several programs to move away from old technology and bring the service into…

Read more
Amelia Brust/Federal News Network

6 ways SASE helps agencies comply with the President’s Cyber EO

Secure Access Service Edge (SASE) is a holistic approach to protecting data, intellectual property and networks both in the cloud and on-prem. 

Read more
AP Photo/Eric GayFILE - In this Thursday, May 2, 2019 file photo, Border Patrol agents hold a news conference prior to a media tour of a new U.S. Customs and Border Protection temporary facility near the Donna International Bridge in Donna, Texas. President Joe Biden’s administration is refusing to allow lawyers who inspect facilities where immigrant children are detained to enter a Border Patrol tent in Texas where agents are holding hundreds of youths. The attorneys say they were allowed to speak to children at the facility in Donna on Thursday, March 11, 2021 but were denied the chance to see the areas where the youths were being held. (AP Photo/Eric Gay, File)

Customs and Border Protection uses large toolbox for identity and access management

Identity and access management, along with zero trust architecture and supply chain risk management, are key foundational points of the president’s cybersecurity executive order issued in May.

Read more

Sign up for breaking news alerts

ASK THE CIO

THURSDAYS @ 10 & 2 p.m.

Weekly interviews with federal agency chief information officers about the latest directives, challenges and successes. Follow Jason on Twitter. Subscribe on Apple Podcasts or Podcast One.