A trio of women in senior IT leadership spanning the top ranks at Federal agencies counseled that hard work, skill in making key relationships, taking career-changing opportunities, and remaining authentic have been among the key steps in their paths to the highest levels of tech leadership in government. […]

cloud computing concept -min

Controlling cloud costs in today’s hybrid and multi-cloud environments can be a challenge for many Federal technology managers after a migration or cloud-native application deployment. There are so many variables to consider, from operational to contracts and licensing issues, that if the process is not well managed costs can spiral out of control.






[…]

AI Cyber World machine learning-min
Computers cloud connected-min

Leaders at defense and intelligence agencies have a unique challenge–how to build a cloud environment that is secure, reliable, and delivers a wide variety of services.






[…]

Federal government, cloud computing
hybrid cloud multi cloud computing in the cloud

As Federal agencies migrate applications to the cloud, data integration can be a major stumbling block that prevents them from reaping the benefits of cloud services. While agencies are putting more applications in cloud environments, often the underlying technologies connecting these applications are still on-premise. As a result, information technology teams must spend time provisioning and maintaining their middleware infrastructure to avoid performance bottlenecks.






[…]

Research firm Gartner has released its 2018 Hype Cycle for Emerging Technologies report, which found technologies like artificial intelligence platform as a service, blockchain for data security, and quantum computing reaching the peak of inflated expectations, while technologies such as mixed reality, and blockchain were on the downswing of excitement.






[…]

Security in the cloud is a shared responsibility between cloud service providers (CSPs) and government organizations. CSPs provide agencies with a secure platform to operate on, but it is the responsibility of agency security leaders to ensure the applications that are being hosted have been hardened, according to security experts.






[…]

A recent study showing just how easy it is to hack into Internet of Things (IoT) devices–and to use that access to gain entrance to a larger network–focused on commercial products used in the home. However, it could serve as yet another wake-up call for the Department of Defense and other government agencies that are increasingly relying on IoT.






[…]

With rapid growth in smart devices, exploding data volumes, and the shift to the cloud, it is becoming more and more challenging to protect critical systems and information. Government and industry leaders convened at the Symantec Government Symposium in Washington, D.C. on Tuesday to discuss these complex challenges and the solutions needed to address them.






[…]

MeriTalk compiles a weekly roundup of contracts and other industry activity. Here’s what happened this week in the Federal Information Technology community.






[…]

Cyber AdAPT, a company that markets a platform that analyzes network traffic in real time for signs of malicious activity, was named the Gartner Cool Vendor for 2017 at the Gartner Security and Risk Management Summit on June 12.






[…]

Categories