Ideas

What It Takes to Become a Cyber Expert

Former federal Chief Information Security Officer Greg Touhill shares what it takes to become a cyber expert.

Ideas

What Happens When You Can't Share or Access Your Own Data?

Agencies can avoid vendor lock-in with hybrid open source software.

Ideas

Threat Hunting and Defensive Tools Government Could Use

New tech designed for cyber defense could help the government make up for lack of personnel.

Ideas

Overcoming Cloud Adoption Obstacles for Federal Agencies

The first step to overcoming cloud risks and challenges is understanding them.

Ideas

Defense Department’s Secret Weapon for Network Security

Lessons civilians—or other organizations—can learn from how the military approaches cybersecurity.

Ideas

7 Skills Federal Cyber Pros Need to Know

The role of the cyber professional is evolving.

Ideas

A Shutdown Smorgasbord for Tired Techies

Amazon's turning to artificial intelligence to get rid of store lines while YouTube is still tuning its algorithms to flag objectionsable content.

Ideas

How APIs Can Reshape the Defense Department Enterprise

By leveraging APIs, Defense stands to realize substantial increases in productivity and reductions in costs.

Ideas

Could This Be the Year Congress Helps Restore Consumer Trust?

Data breaches touched almost every sector hurting us where we live, shop, ride and bank.

Ideas

3 Steps to Effective Application Modernization

Even after convincing pitches, agencies need to choose the right technology based on their overall business goals.

Ideas

3 Steps to Successful Bot Management

Bots drive plenty of online traffic and agencies need to figure out how to deal with them.

Ideas

Meltdown and Spectre Complicate Government’s Cybersecurity Posture

The potential footprint makes 2014’s Heartbleed look like an op-forces training exercise.

Ideas

State-Sponsored Internet and App Shutdowns Damage Economies—And Freedom

We cannot turn a blind eye to it.

Ideas

Compliance Isn’t Security—But It Helps

For more secure networks, federal IT teams should balance compliance exercises with risk management strategies.