Insider Insights

  • Mask of human head with bar code

    The steady convergence of physical and digital identity

    Modern identity management requires a layered approach that supports physical and digital identities and allows enables bring-your-own-identity policies.

  • devops concept (Profit_Image/

    How IT teams can implement DevOps

    By integrating DevOps, IT teams ensure a continuous delivery of software and a flexible approach to building out next-generation solutions that increase visibility and support complex challenges.

  • people voting (Gino Santa Maria/

    5 ways to address election system weaknesses

    Vulnerable systems can undermine voters' confidence in the security of the process and expose sensitive voter data.

  • admin password (ronstik/

    Protecting systems from rogue root users

    Hardware-based security can stop compromised credentials from being used to leak data.

  • surveillance camera (josefkubes/

    3 factors affecting video surveillance storage

    Agencies investing in more powerful cameras and analytics software should base their video storage decisions on retention time, accessibility and cost.

  • data center monitoring

    Back to the basics with software-defined data centers

    Traditional monitoring and management techniques can help government IT administrators deliver an automated, scalable and highly agile networking environment.

  • security meter on excellent

    Better prep for cyberattacks

    A robust threat management strategy ensures the overall health and security of the environment and mitigates threats posed by employees, hostile actors and organized large-scale attacks.

  • login as root

    Weave your cybersecurity tactics into a cohesive strategy

    By protecting the credentials used to spread an attack, IT managers can mitigate damage after an initial breach.

  • dragon fighting (rudall30/

    Kanban for slaying the external dependency monster in migrations

    Simple and flexible, Kanban can facilitate communication so teams can easily spot trends and gather metrics for future use.

    Comments: 2
  • risk management

    How agencies can comply with the cyber executive order

    The risk-management approach requires agencies to have a clear and detailed understanding of their IT environment.

inside gcn

  • open doors to cloud (Sergey Nivens/

    New vendors join FedRAMP Connect