Jordan Walker
-
Army Faces Tech Modernization Challenges
Army has become more data-centric but still has a long way to go.
7m read -
Automation Drives Cybersecurity Innovation at ICE
ICE is automating and integrating its security processes to stay on top of threats.
7m read -
AI and Automation Are Vital to Navy's Cyber Readiness
Zero trust and a strong cybersecurity culture will help the Department of the Navy prepare its data for AI.
7m read -
How Leidos Is Furthering Supply Chain Risk Management Education for a Secure Future
Showing leadership the value of supply chain risk management is key for better cybersecurity and fewer cyber incidents.
7m read -
Labor CIO Prioritizes CX as Center of Digital Transformation
Gundeep Ahluwalia said CX should be “baked into the cake,” not the “icing on top.”
7m read -
CBP Modernization Strategy Prioritizes Cybersecurity, Customer Experience
CBP CIO Sonny Bhagowalia said cyber threats have increased by 225% and require improved response.
7m read -
CISA Mandates Federal Agencies Account For Assets On Networks
CISA's new directive aims to improve asset visibility and allow to manage cybersecurity risks federal agencies face.
7m read -
Data Mapping, Operational Understanding Are Next Steps For Zero Trust
Agencies are aligning security and performance needs.
7m read -
Federal Agencies Implementing New Approaches to Software Security
Modernizing approaches to software security leads to better detecting vulnerabilities and preventing zero-day incidents like the SolarWinds attack.
7m read -
GSA Outlines Best Practices for Identity Management
Ken Myers explains how GSA’s new playbooks are guiding federal agencies’ identity management.
7m read -
Data Management Key to Successful Zero Trust Strategy, CISA Says
Data standards and governance determine federal agencies's readiness for zero trust.
7m read -
VA CIO: Zero Trust at the Core of Agency's Vision, Security-Focused Workforce
CIO Kurt DelBene stresses the importance of building the agency's vision and workforce upon the fundamental aspects of zero trust.
7m read