Cybersecurity

Resource center

Chris Lavergne, CGI Federal
Chris Lavergne

Embracing attribute-based access control in enterprise IT modernization: A pathway to zero trust

2026-03-16 Modernizing IT infrastructure is essential to protect sensitive data and ensure resilient operations. Attribute-based access control (ABAC) offers a policy-driven approach that evaluates user, device and environmental attributes to enforce granular access decisions. Unlike traditional role-based access control (RBAC), ABAC...

headshot of Conrad Symber
Conrad Symber

Quantum readiness: Preparing federal agencies for tomorrow’s cyber threat

2026-01-13 Federal agencies can proactively prepare for the quantum world by following these five steps: Inventory, develop a roadmap, prioritize high-risk systems, and adopt post-quantum systems, and build quantum-aware teams.

headshot of David Comiskey
David Comiskey

Smashing cybersecurity silos: Reining in tool sprawl to gain unified visibility

2025-08-25 In today's increasingly complex threat landscape, organizations face a seemingly paradoxical challenge: They invest in and deploy security tools to protect their environments, but the proliferation often actually weakens their defenses. As the number of tools rises, operational effectiveness decreases...

David Crawford, CGI Federal
David Crawford

Achieving operational efficiency through portfolio rationalization, IT modernization and zero trust implementations

2025-04-23 Read about achieving operational efficiency through IT modernization efforts in PSC Magazine on page 27. A seemingly endless number of moving parts face federal chief information officers and other IT leaders every day, and it can be tempting to approach...

Stephanie Ackman, CGI Federal
Stephanie Ackman

Enhancing security through IT modernization

2025-04-21 Zero trust implementation and IT modernization are interconnected concepts that enhance cybersecurity and operational efficiency, respectively. When organizations undertake them together, as a coordinated initiative, the benefits can multiply well beyond what either one alone can do. IT modernization goals...

David Crawford, CGI Federal
David Crawford

Bridging the gap: Aligning cybersecurity and financial strategy for government

2024-10-25 In today's complex threat landscape, federal agencies must prioritize cybersecurity while navigating financial constraints. By effectively aligning cybersecurity and financial strategies, agencies can enhance their resilience, protect sensitive data and ensure compliance with regulations. Read on to discover key strategies...

David Crawford, CGI Federal
David Crawford

Protecting the crown jewels: safeguarding your data from cyber threats

2024-10-18 Data is the primary target of cyber adversaries, By adopting a Zero Trust architecture, closely monitoring your systems, and managing access control are all vital steps in ensuring the confidentiality, integrity, and availability of your data.

David Crawford, CGI Federal
David Crawford

The key pillars of zero trust: Beyond identity, device, network, application and data

2024-10-03 Visibility and Analytics, Automation and Orchestration and Governance are the three pillars form the foundation of a robust Zero Trust architecture.

Jennifer Ricker professional photo
Jennifer Ricker

Insights from the 2024 NASACT Annual Conference

2024-09-19 Today’s state leaders seek opportunities to safely leverage new technology, combat cyberattacks and comply with new governing rules and regulations. This was evident at the National Association of State Auditors, Comptrollers, and Treasurers (NASACT) annual conference, where finance leaders met...