Remove Government Agency Remove Implementation Remove Security
article thumbnail

Enhancing Federal AI Safety: Responsible and Secure AI Sandbox

Microsoft Public Sector

Who Should Read This This document will be beneficial to Federal Executives including Chief Information Officer, Chief Artificial Intelligence Officer, Chief Technology Officer, Chief Information Security Officer, Chief Data Officer, AI Lead, AI Scientist, and Data Scientist, among others.

Security 115
article thumbnail

Securing cloud applications in government’s multi-cloud world

American City & Country

Today, government IT teams find themselves navigating a labyrinth of security controls, compliance requirements, and risk management practices. As a result, by embracing a multi-cloud strategy, government agencies must also be prepared to address a series of operational and security challenges.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

How Apigee can help government agencies adopt Zero Trust

Google Public Sector

Securely sharing data is critical to building an effective government application ecosystem. Rather than building new applications, APIs can enable government leaders to gather data-driven insights within their existing technical environments. API protection is a core principle to implement Zero Trust architecture.

article thumbnail

How AWS can help mission-focused organizations comply with the White House National Security Memorandum on AI

AWS Public Sector Blog

On October 24, 2024, the White House released a National Security Memorandum (NSM) on Artificial Intelligence (AI) , which focuses on ensuring US leadership in developing advanced AI technologies. AWS’s commitment to security and compliance directly aligns with the NSM’s trustworthiness goals.

article thumbnail

Small budget, strong security: Why Zero Trust is key to protecting critical infrastructure

American City & Country

Earlier this year, the Cybersecurity and Infrastructure Security Agency (CISA), National Security Agency (NSA) and Federal Bureau of Investigation (FBI) issued a joint advisory , warning government agencies of potential disruptions to U.S. critical infrastructure by cyber actors.

article thumbnail

Protecting Your Identity in a Sea of Cyber Security Scams

American City & Country

You probably don’t wake up thinking about cyber security, or whether you may fall for a phishing attack. Read on to explore the world of cyber security and phishing, while learning simple and effective ways to protect your identity online. Install and Update Security Software: Cyber security technology is always advancing!

article thumbnail

How to Secure Legacy Systems

GovLoop

There are a lot of points of entry now,” said Raghurama Pantula, Director of Information Security for Karsun Solutions, a modernization company that applies innovative approaches to help achieve agency missions. “So, But legacy hardware and software, which abound in government agencies, can create a barrier to implementing zero trust.