cloud security | GovCIO Media & Research

cloud security

VA’s Kendall Krebs unpacks the latest developments with the agency’s cloud migration and discusses next steps for security.
DOD wants more visibility into the commercial cloud service provider side, rather than just the customer side.
Defense cyber leaders are honing in on cloud modernization challenges, JWCC and zero trust.
The use of unauthorized technology has become increasingly prevalent in the remote work environment, weakening cybersecurity.
The Defense Department’s CMMC program and NIST guidance are helping agencies reap the benefits of hybrid cloud without sacrificing security.
Defense cloud leaders dissect cloud security myths and challenges, with DevSecOps and zero trust as the pillars of a secure hybrid cloud.
Korie Seville, Technical Director, Hosting and Compute Center (HaCC), DISA
The service's upcoming efforts are honing in on advanced data management and analysis to expedite decision-making and joint operations.
As federal agencies embark on larger cloud transformation programs, government technology leaders are paying attention to the foundations for building in comprehensive cybersecurity.
Software supply chain risk management and continuous monitoring are key strategies for maintaining a strong cyber posture in the cloud.
Cybersecurity is a challenge in hybrid cloud environments with disparate missions.
SolarWinds, CISA and the White House issued new information regarding the state of cyber and advised how to better secure critical infrastructure.
Federal agencies can start by applying a zero trust security model to cloud operations.
Congress and GSA are working to improve FedRAMP amid the push for cloud adoption.
A GSA IT modernization lead highlights importance of governance, security, training and more during all stages of cloud migration.
DHS cyber leaders have a laundry list of items for federal CISOs to address.
An Atlantic Council leader advocates for greater empowerment of the CISO role.
Migrating to the cloud securely does not have to hinder optimal workflows.