Cybersecurity

Resource center

Brigitte Custer, CGI Federal
Brigitte Custer

Zero Trust for the Resourceful: Maximizing Security with Minimal Budget

2024-03-22 In today's ever-evolving cyber landscape, the need for robust cybersecurity measures is more pressing than ever. However, for organizations operating under budget constraints, achieving this goal may seem daunting. Zero Trust challenges traditional cybersecurity approaches by emphasizing continuous vigilance and...

Sourabh Pawar
Sourabh Pawar

Moving from data to insights with a data pipeline

2024-03-21 The need for data-driven insights is nothing new. Organizations are still challenged, though, to derive meaningful insights from data across multiple systems, such as systems of record, managerial systems and publicly available data. One key way to transform a mass...

Eric Thibodeaux professional photo
Eric Thibodeaux

Advancing public services: The impact of Software-as-a-Service in state and local government

2024-02-08 In the ever-evolving realm of technology solutions for the public sector, Software-as-a-Service (SaaS) cloud solutions have emerged as a transformative tool, offering efficient and secure Enterprise Resource Planning (ERP) options.

Lidija Salvaggio, CGI Federal
Lidija Salvaggio

Software bill of materials: What you need to know

2023-04-13 Cybersecurity is an endlessly challenging topic, and recently, the software supply chain has proven to be vulnerable. Executive Order 14028, which President Biden signed in May 2021, sets out a comprehensive approach to securing our digital infrastructure. The order establishes...

Paresh Patel of CGI Federal
Paresh Patel

Maneuverability: The next phase in cybersecurity

2023-04-11 For decades, federal agencies and other organizations have improved their responses to ever-more sophisticated and aggressive cybersecurity threats in essentially the same way. They use blocking and tackling, or more directly, detecting and responding. Consider these common scenarios: A new...

Headshot of Laurence Hart
Laurence Hart

Bringing 'shadow IT' into the light: Citizen development governance as guardrails

2023-01-16 Shadow IT is evolving into citizen development, thanks to agencies and other organizations that recognize the value of the resulting tools and apply governance to mitigate risk.

John Nemoto
John Nemoto

Enabling smart data sharing to strengthen cyber posture at civilian agencies

2022-12-08 Note: This article first appeared on Federal News Network For many years, federal agencies treated data as something to guard at all costs, resulting in redundant and disconnected systems across government. Things have changed in recent years. The world’s health...

David Crawford, CGI Federal
David Crawford

How CDM concepts can aid a zero trust transition

2022-10-28 The CDM program was not initially established as a zero trust solution. However, CDM provides some foundational elements that align directly with risk management and zero trust efforts.

headshot of Terri Musick
Teri Musick

Balancing Agile and cybersecurity implementation

2022-10-05 Agile development and integrated software security might seem like natural counterparts. However, there are ways to integrate them into a single secure Agile process.