Subscribe

Cybersecurity
The Zero Trust (ZT) architecture is a modern concept shaping cybersecurity in the public and private sectors. The growing use of SaaS applications, migration to cloud-based architecture, a rising number of remote employees, and bring-your-own-device (BYOD) have rendered perimeter-based security obsolete. The concept of a network perimeter where those outside of the enterprise's control are malicious and insiders are trustworthy — is no longer a viable approach to cybersecurity.
Cybersecurity, Market Intelligence
Are you next? Will criminals target your organization with ransomware? No one can say for sure, so prepare now. Here are four and a half critical decisions to make – and things to do – before a crisis hits.   (What’s half a decision, you ask? What’s half an action, you may wonder. Read to end if you want to find out). 1. Do: Have a plan This sounds so obvious, but I have seen major organizations in business and government scrambling to respond to a ransomware attack. Your plan should include at least these elements?
DevSecOps
Last month, ICIT sponsored an online panel discussion featuring a number of application development and cybersecurity experts from across industry, the federal government, and the Department of Defense. This panel discussion focused on two new security vectors that have arisen as application development practices and technologies have evolved – infrastructure as code (IaC) and APIs.
DevSecOps
Article originally posted by the GovDevSecOpsHub here. Today’s Application Security (AppSec) measures focus on protecting web applications. These measures include methods of preventing data or code within the application from being compromised or hijacked. AppSec is an essential part of the Software Development Life Cycle (SDLC) and ensuring that applications are secured must be a top priority in today’s ever-evolving and expanding digital landscape.
Cybersecurity, DevSecOps
Article originally posted to the GovDevSecOpsHub here. When in-person processes became impossible during the pandemic, the extent to which public sector services relied on them became apparent. Town halls, municipal offices, schools, and colleges were forced to close their doors to the public, and the need to provide digital alternatives to citizen services so that constituents could continue to access them became clear.
Cloud, DevSecOps
Article originally posted to the GovDevSecOpsHub here.