Remove Distribution Remove Magazine Remove Networking
article thumbnail

Applying Zero Trust Architecture in State & Local Government

FedInsider

Rather than using a “hub-and-spoke” method of connecting employees to servers, data, applications, and each other – where cybersecurity focused on firewalls around the perimeter – suddenly the systems had to become decentralized, distributed and open to remote workers.

article thumbnail

Agencies Need Security Strategies Before Establishing Hybrid Data Centers

FedTech Magazine

A hybrid data center relies on cloud, software-defined networking and virtualization technologies to distribute applications across physical and multicloud environments. These strategies should identify desired security tools and practices such as cloud environments and ways to continuously monitor them.

Data 102
professionals

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

DOD Spreads 5G Technology Across the Country

FedTech Magazine

Imagine autonomous shuttle buses transporting military personnel around a base, or a smart warehouse using a distributed sensor network and robotics to track military vehicles. 5G, the fifth-generation wireless network, is expected to deliver much higher data speeds,…

Warehouse 107
article thumbnail

Edge Computing Helps Federal Clinicians Serve Remote Regions

FedTech Magazine

Technologists refer to IT environments in such remote places as “disadvantaged networks” because data transfer is difficult. Still, it’s not impossible if an agency moves to a distributed architecture allowing for analytics at the periphery — as close to the source as possible. That in a nutshell is edge computing.

article thumbnail

Cloud Architecture Matters: Improve Cloud Security by Writing Natively to the Cloud (E165)

FedInsider

Prior to Akamai, Mr. Bonci was involved in the Open Source community as an engineer at VA Linux and as a contributor to the Debian Linux Distribution. Over this 14 year tenure, he had numerous roles in the public sector, including engineering management and as an individual contributor in systems engineering and web applications.

article thumbnail

Letting the Good Ones In, Keeping the Bad Ones Out: Managing Access for Zero Trust (E140)

FedInsider

In this role, John was responsible for managing risk in the cyber domain and ensuring security throughout DISA and the Department of Defense Information Network (DoDIN). His portfolio included mobility, networks operations, cybersecurity, and innovation. He is also an Eagle Scout.

article thumbnail

Cloud Architecture Matters: Improve Cloud Security by Writing Natively to the Cloud

FedInsider

Prior to Akamai, Mr. Bonci was involved in the Open Source community as an engineer at VA Linux and as a contributor to the Debian Linux Distribution. While at the Pentagon with HQDA CIO/G-6, he served in leadership roles for strategic initiatives managing an Army-wide IT reform and network modernization effort. security agencies.