Gurmeet Singh, CGI Federal
Gurmeet Singh

Trust no one: The power of zero trust architecture

2021-11-05

Zero trust architecture becomes a journey to a broader strategy for modern security. Rapid digital transformation engenders a complex, evolving environment. ZTA protects employees, devices, apps and data wherever they...

Todd Schryer, CGI Federal
Todd Schryer

Leaping hurdles in CDM

2021-09-02

How changes to the CDM dashboard's architecture made data much more useful.

Sangram Deshmukh CGI Federal
Sangram Deshmukh

Moving to SecDevOps: A primer

2020-11-13

Over the past few years, federal agencies have become more and more comfortable with Agile development methodology and related DevOps practices. Adopting these ideas means that the developers improve software...

CGI’s Cybersecurity Practice
CGI’s Cybersecurity Practice

The impact of a cyber breach on public sector organizations

2017-06-22

Recently, CGI commissioned research from Oxford Economics—The Cyber-Value Connection—to explore the link between a cyber incident and company value. Specifically, we wanted to develop an analytical methodology to examine share-price...

CGI’s Cybersecurity Practice
CGI’s Cybersecurity Practice

OT-IT convergence brings opportunities and risk

2017-06-01

Operational technology (OT) or industrial control systems (ICS) are responsible for keeping the power on and water and gas flowing to support essential services for consumers, industry and governments. As...

CGI’s Cybersecurity Practice
CGI’s Cybersecurity Practice

When IoT means Internet of Threats

2017-03-15

This new world of the Internet of Things (IoT) is transforming organizations as well as personal homes and even individual consumers into “data centers” where information technology is used for...