How to bridge the cyber gap: Mentoring strategies for the next generation
The U.S. faces thousands of vacancies in cybersecurity jobs. Identifying non-traditional candidates and mentoring them can help fill those gaps.
Shadow IT is evolving into citizen development, thanks to agencies and other organizations that recognize the value of the resulting tools and apply governance to mitigate risk.
Note: This article first appeared on Federal News Network For many years, federal agencies treated data as something to guard at all costs, resulting in redundant and disconnected systems across...
The CDM program was not initially established as a zero trust solution. However, CDM provides some foundational elements that align directly with risk management and zero trust efforts.
The U.S. faces thousands of vacancies in cybersecurity jobs. Identifying non-traditional candidates and mentoring them can help fill those gaps.
In CGI’s 2022 Voice of Our Clients report, leaders across the globe cited cybersecurity as the top trend affecting their ability to deliver on the mission. Threats come from many...
Agile development and integrated software security might seem like natural counterparts. However, there are ways to integrate them into a single secure Agile process.
We spend millions on technology to address cyber threats, but just a pittance on what matters most. While technology plays an offensive role in our cyber profile, we cannot fully...
Zero trust architecture becomes a journey to a broader strategy for modern security. Rapid digital transformation engenders a complex, evolving environment. ZTA protects employees, devices, apps and data wherever they...