Balancing Agile and cybersecurity implementation
Agile development and integrated software security might seem like natural counterparts. However, there are ways to integrate them into a single secure Agile process.
Shadow IT is evolving into citizen development, thanks to agencies and other organizations that recognize the value of the resulting tools and apply governance to mitigate risk.
Note: This article first appeared on Federal News Network For many years, federal agencies treated data as something to guard at all costs, resulting in redundant and disconnected systems across...
The CDM program was not initially established as a zero trust solution. However, CDM provides some foundational elements that align directly with risk management and zero trust efforts.
Agile development and integrated software security might seem like natural counterparts. However, there are ways to integrate them into a single secure Agile process.
We spend millions on technology to address cyber threats, but just a pittance on what matters most. While technology plays an offensive role in our cyber profile, we cannot fully...
Zero trust architecture becomes a journey to a broader strategy for modern security. Rapid digital transformation engenders a complex, evolving environment. ZTA protects employees, devices, apps and data wherever they...
How changes to the CDM dashboard's architecture made data much more useful.
Nowadays, open-source components such as libraries, frameworks and other software modules dominate the enterprise. Free and open-source software (FOSS) serves as a fundamental building block for many technologies. Developers no...