This site uses cookies to improve your experience. To help us insure we adhere to various privacy regulations, please select your country/region of residence. If you do not select a country, we will assume you are from the United States. Select your Cookie Settings or view our Privacy Policy and Terms of Use.
Cookie Settings
Cookies and similar technologies are used on this website for proper function of the website, for tracking performance analytics and for marketing purposes. We and some of our third-party providers may use cookie data for various purposes. Please review the cookie settings below and choose your preference.
Used for the proper function of the website
Used for monitoring website traffic and interactions
Cookie Settings
Cookies and similar technologies are used on this website for proper function of the website, for tracking performance analytics and for marketing purposes. We and some of our third-party providers may use cookie data for various purposes. Please review the cookie settings below and choose your preference.
Strictly Necessary: Used for the proper function of the website
Performance/Analytics: Used for monitoring website traffic and interactions
Imagine autonomous shuttle buses transporting military personnel around a base, or a smart warehouse using a distributed sensor network and robotics to track military vehicles. 5G, the fifth-generation wireless network, is expected to deliver much higher data speeds,…
A hybrid data center relies on cloud, software-defined networking and virtualization technologies to distribute applications across physical and multicloud environments. These strategies should identify desired security tools and practices such as cloud environments and ways to continuously monitor them.
Technologists refer to IT environments in such remote places as “disadvantaged networks” because data transfer is difficult. Still, it’s not impossible if an agency moves to a distributed architecture allowing for analytics at the periphery — as close to the source as possible. That in a nutshell is edge computing.
Rather than using a “hub-and-spoke” method of connecting employees to servers, data, applications, and each other – where cybersecurity focused on firewalls around the perimeter – suddenly the systems had to become decentralized, distributed and open to remote workers.
“And we've spent a lot of time thinking about the best way to approach these changes." ( IRS reorganizes its top ranks, with focus on ‘historic’ agency modernization - Federal News Network) The Homeland Security Department is turning off two key features of a major cybersecurity program.
Prior to Akamai, Mr. Bonci was involved in the Open Source community as an engineer at VA Linux and as a contributor to the Debian Linux Distribution. Over this 14 year tenure, he had numerous roles in the public sector, including engineering management and as an individual contributor in systems engineering and web applications.
Prior to Akamai, Mr. Bonci was involved in the Open Source community as an engineer at VA Linux and as a contributor to the Debian Linux Distribution. While at the Pentagon with HQDA CIO/G-6, he served in leadership roles for strategic initiatives managing an Army-wide IT reform and network modernization effort. security agencies.
In this role, John was responsible for managing risk in the cyber domain and ensuring security throughout DISA and the Department of Defense Information Network (DoDIN). His portfolio included mobility, networks operations, cybersecurity, and innovation. He is also an Eagle Scout.
Zero Trust has revolutionized the way agencies everywhere are securing their networks, and this week on Feds at the Edge , we talk with titans in the field, including John Kindervag, Chief Evangelist with Illumio, who in 2010 coined the phrase “ zero trust model.” Limiting our understanding to “the main and the plain” could lead to trouble.
In addition to distributing critical funding, the EAC strategically pivoted resources to help election officials as they confronted obstacles and made difficult decisions of how to best run their elections. In accordance with the standards of the National Registry of CPE Sponsors, 50 minutes equals 1 CPE.
Thanks to the training I received, I have improved my skills in tracking the distribution of the state budget and identifying potential cases of corruption.” “Unfortunately, many people do not know about the potential of monitoring public procurement tenders. This stage took place offline.
Case Study: Genesee County, Michigan Don Stockley × Don Stockley Technical Services Manager As Technical Services Manager for Genesee County Donald Stockley oversee our Datacenter and Network teams. Certificates will be e-mailed to registrants. He has been with the County for 1 ½ years.
We organize all of the trending information in your field so you don't have to. Join 5,000+ users and stay up to date on the latest articles your peers are reading.
You know about us, now we want to get to know you!
Let's personalize your content
Let's get even more personalized
We recognize your account from another site in our network, please click 'Send Email' below to continue with verifying your account and setting a password.
Let's personalize your content