John Nemoto
John Nemoto

Harnessing AI as a cybersecurity game-changer

2024-06-18

Artificial intelligence offers almost unlimited potential to reshape traditional methods of achieving business and mission objectives. While many detractors will point to the potential threats that AI poses to privacy...

Sourabh Pawar
Sourabh Pawar

Moving from data to insights with a data pipeline

2024-03-21

The need for data-driven insights is nothing new. Organizations are still challenged, though, to derive meaningful insights from data across multiple systems, such as systems of record, managerial systems and...

Lidija Salvaggio, CGI Federal
Lidija Salvaggio

Software bill of materials: What you need to know

2023-04-13

Cybersecurity is an endlessly challenging topic, and recently, the software supply chain has proven to be vulnerable. Executive Order 14028, which President Biden signed in May 2021, sets out a...

Paresh Patel of CGI Federal
Paresh Patel

Maneuverability: The next phase in cybersecurity

2023-04-11

For decades, federal agencies and other organizations have improved their responses to ever-more sophisticated and aggressive cybersecurity threats in essentially the same way. They use blocking and tackling, or more...

David Crawford, CGI Federal
David Crawford

How CDM concepts can aid a zero trust transition

2022-10-28

The CDM program was not initially established as a zero trust solution. However, CDM provides some foundational elements that align directly with risk management and zero trust efforts.

headshot of Terri Musick
Teri Musick

Balancing Agile and cybersecurity implementation

2022-10-05

Agile development and integrated software security might seem like natural counterparts. However, there are ways to integrate them into a single secure Agile process.