Remove Development Remove Public Face Remove Security
article thumbnail

The 2025 Modernization Playbook

GovLoop

Adaptive Security: Artificial intelligence will rapidly become a standard part of most threat detection and incident response plans, augmenting not replacing staff. 5 Tech Trends to Watch According to Gartner, here are the top technology trends that government chief information officers should watch.

article thumbnail

Governments should look under the hood to make sure their IT systems are safe from cyber criminals

American City & Country

The first step is to assess the current state of security: the surface area, the technical situation and the practices and processes that govern the human elements of security. Koenig says that if IT leaders don’t have a comprehensive picture of the state of security, they risk neglecting something that is important.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

Harnessing the power of generative AI in AWS GovCloud

AWS Public Sector Blog

In an era of increasing regulatory scrutiny and data privacy requirements, organizations working in the public sector need robust, secure, and compliant solutions. Traditional data processing methods can be slow and resource-intensive, especially when handling sensitive information that must remain secure and compliant.

article thumbnail

Overcome Manual App Testing Challenges to Drive Modernization: Insights from California CIO Academy

Government Technology Insider

During the breakout session “The Expanding Realm of Today’s CIO,” Thomas Boon , CIO of California’s Governor’s Office of Business and Economic Development (GO-Biz), discussed that technology doesn’t stay around for decades like it used to. Learn more ways to overcome manual app testing challenges here.

article thumbnail

Zero-Trust Architectures Should Include Data Protection, Cyber Recovery

FedTech Magazine

Data protection and cyber recovery solutions are key components of federal zero-trust security architectures, particularly for civilian agencies with public-facing networks. President Biden’s May 2021 cybersecurity executive order mandated that agencies develop zero-trust architecture implementation plans.

article thumbnail

Simplify firewall deployments using centralized inspection architecture with Gateway Load Balancer

AWS Public Sector Blog

Gateway Load Balancer (GWLB) enables seamless integration of these firewall appliances into the AWS architecture, ensuring consistent security policies and minimizing disruptions. This allows IT departments to provide a centralized inspection service for other lines of business to consume, enforcing the desired security posture.

article thumbnail

Introducing the Government Lens for the AWS Well-Architected Framework

AWS Public Sector Blog

The framework consists of questions, design principles, and best practices across the six pillars: Operational Excellence , Security , Reliability , Performance Efficiency , Cost Optimization , and Sustainability. It encourages a dialogue between technologist and policy professionals to create better government services.