Remove Article Remove Data Remove Networking
article thumbnail

Using Data to Fortify Network Defenses

FedInsider

Introduced in 2012, the program provides a dynamic approach to strengthening the cybersecurity of government networks and systems. For FedInsider, he has written many articles and white papers and acted as the moderator for over 20 interviews featuring federal, state and local officials discussing technology, policy and governmental issues.

article thumbnail

GuardSTACK’s Richie Obermayer: 5G Networks Could Accelerate Government Digital Transformation Efforts

GovCon Wire

In an article published on Carahsoft.com, Obermayer wrote that 5G networks provide lower latency and faster speeds and facilitate the deployment of internet of things-based sensors used for gathering and analyzing

professionals

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Protecting APIs & Sensitive Data

FedInsider

Wednesday, April 3, 2024 | 2:00PM EDT | 1 Hour | 1 CPE In today’s interconnected digital landscape, application programming interfaces (APIs) play a pivotal role in facilitating seamless communication and data exchange between various applications and systems.

Data 119
article thumbnail

Beyond the enterprise: Zero trust adapts to the dynamic demands of the tactical edge

FedScoop

But with power lines down and cellular towers knocked offline, sharing that data became a herculean task. In disaster zones or remote battlefields, bandwidth can be constrained, networks are often improvised, and the threat environment can shift rapidly. We ended up rebuilding the network from scratch.

Demand 55
article thumbnail

Accelerating AI Adoption with Trusted Data

FedInsider

Tuesday, August 20, 2024 | 2:00PM EDT | 1 Hour | 1 CPE As agencies face unprecedented data volumes and velocity, managing the speed and size of the data flow efficiently becomes a significant challenge , especially with the growing use of AI-based analytics.

Data 93
article thumbnail

How to Extend Zero Trust to Data at the Edge

GovLoop

With the rise of remote work and the explosion of the Internet of Things (IoT) generating large volumes of data in the field, agencies want to provide staff the ability to analyze and use that data in the field as well. But there’s a catch: They also need to secure that data. This is the concept of edge computing. The solution?

Data 97
article thumbnail

How State & Local Governments Can Secure Unstructured Data

FedInsider

Thursday, January 18, 2024 | 2:00PM EST | 1 Hour | Training Certificate State and local governments and education produce large amounts of unstructured data in a wide range of data types. Keeping these diverse data sets safe and ensuring their high availability are essential for smooth educational and government operations.

Data 98