Primary tabs

Five keys to data privacy

Even the best-defended organizations can sometimes fall victim to attack, so maintaining effective data privacy practices must be a top priority.

Moving to SecDevOps: A primer

Over the past few years, federal agencies have become more and more comfortable with Agile development methodology and related DevOps practices. Adopting these ideas means that the developers improve software...

William Sterbinsky
William Sterbinsky

The three pillars: Assessing your cybersecurity posture


This month marks the 17th Annual National Cybersecurity Awareness Month with the theme: “Do Your Part. #BeCyberSmart.” It’s a good time to take a step back to assess your organization’s...

Evan Uhl
Evan Uhl

Keep up with the CDM program’s evolving strategy


Federal civilian agencies are increasingly realizing that the Department of Homeland Security’s Continuous Diagnostics and Mitigation (CDM) program is the cybersecurity strategy of their future. As such, information technology (IT)...

Picture of Kevin Doyle
Kevin M. Doyle

Setting new standards for the IoT


Embedded systems must be secure, reliable and scalable. CGI has developed some draft standards to help ensure they will be.

Jim Menendez

Laying the foundation for cybersecurity


Modernizing security sounds like a great goal, but the reality is, most organizations are still struggling with the basic elements of securing information and information assets. New tools and technologies...