Primary tabs

Five keys to data privacy

Even the best-defended organizations can sometimes fall victim to attack, so maintaining effective data privacy practices must be a top priority.

Sangram Deshmukh CGI Federal
Sangram Deshmukh

Moving to SecDevOps: A primer


Over the past few years, federal agencies have become more and more comfortable with Agile development methodology and related DevOps practices. Adopting these ideas means that the developers improve software...

William Sterbinsky
William Sterbinsky

The three pillars: Assessing your cybersecurity posture


This month marks the 17th Annual National Cybersecurity Awareness Month with the theme: “Do Your Part. #BeCyberSmart.” It’s a good time to take a step back to assess your organization’s...

Evan Uhl
Evan Uhl

Keep up with the CDM program’s evolving strategy


Federal civilian agencies are increasingly realizing that the Department of Homeland Security’s Continuous Diagnostics and Mitigation (CDM) program is the cybersecurity strategy of their future. As such, information technology (IT)...

Picture of Kevin Doyle
Kevin M. Doyle

Setting new standards for the IoT


Embedded systems must be secure, reliable and scalable. CGI has developed some draft standards to help ensure they will be.