Top 3 Cloud Security Priorities in the Federal Government

By Jessica Parks, Market Intelligence Analyst

The last year of teleworking has caused an uptick in hybrid and multi-cloud environments, due to the flexibility, scalability and cost efficiencies that these environments offer dispersed teams. As federal agencies look to their futures within these increasingly complex environments, you can bet security is top of mind. When talking with your customers about how you can help provide peace of mind, keep in mind they are likely prioritizing one (or all!) of the following:

1) Baking security into products during the development process

As more federal software development teams embrace DevOps and DevSecOps, they recognize that developing applications on cloud platforms can further shorten timelines for spinning up new solutions. With this recognition comes an increased focus on baking security into these solutions during the development process.

Read more of this post

TIC 3.0 Is Shaping Government Network Security to the Edge

By Jessica Parks, Market Intelligence Analyst

In an increasingly interconnected world, we often take for granted the availability and security of networks whenever we sign on to our devices. Agencies are now taking a closer look at the bandwidth and security of their networks and the Department of Homeland Security has been ahead of that curve — working on updating its Trusted Internet Connection (TIC) policy.

Draft guidance on TIC 3.0 is in process, with new documents expected to be published this spring. TIC policy aims to standardize security rules for networks, so you can bet federal agencies will be paying close attention to this guidance as it is released. Here is a look at TIC 3.0 and what it means for you.

Security Moving Out

With more agencies moving away from traditional network perimeters and into complex cloud environments, TIC 3.0 is defining where to secure these networks. One thing is for sure, as TIC 3.0 Program Manager Sean Connelly pointed out at the FCW Cloud Security Workshop in February, TIC 3.0 is moving security tools towards the users and applications themselves.   Read more of this post

%d bloggers like this: