Cybersecurity

Resource center

David Crawford, CGI Federal
David Crawford

Bridging the gap: Aligning cybersecurity and financial strategy for government

2024-10-25 In today's complex threat landscape, federal agencies must prioritize cybersecurity while navigating financial constraints. By effectively aligning cybersecurity and financial strategies, agencies can enhance their resilience, protect sensitive data and ensure compliance with regulations. Read on to discover key strategies...

David Crawford, CGI Federal
David Crawford

Protecting the Crown Jewels: Safeguarding Your Data from Cyber Threats

2024-10-18 Data is the primary target of cyber adversaries, By adopting a Zero Trust architecture, closely monitoring your systems, and managing access control are all vital steps in ensuring the confidentiality, integrity, and availability of your data.

David Crawford, CGI Federal
David Crawford

The Key Pillars of Zero Trust: Beyond Identity, Device, Network, Application, and Data

2024-10-03 Visibility and Analytics, Automation and Orchestration and Governance are the three pillars form the foundation of a robust Zero Trust architecture.

Jennifer Ricker professional photo
Jennifer Ricker

Insights from the 2024 NASACT Annual Conference

2024-09-19 Today’s state leaders seek opportunities to safely leverage new technology, combat cyberattacks and comply with new governing rules and regulations. This was evident at the National Association of State Auditors, Comptrollers, and Treasurers (NASACT) annual conference, where finance leaders met...

John Nemoto
John Nemoto

Harnessing AI as a cybersecurity game-changer

2024-06-18 Agencies can harness AI against adversaries through the same strengths AI brings to other applications. In its ability to analyze massive datasets, identify patterns and provide actionable insights, AI can identify and neutralize threats with astonishing speed and accuracy.

Brigitte Custer, CGI Federal
Brigitte Custer

Zero Trust for the Resourceful: Maximizing Security with Minimal Budget

2024-03-22 In today's ever-evolving cyber landscape, the need for robust cybersecurity measures is more pressing than ever. However, for organizations operating under budget constraints, achieving this goal may seem daunting. Zero Trust challenges traditional cybersecurity approaches by emphasizing continuous vigilance and...

Sourabh Pawar
Sourabh Pawar

Moving from data to insights with a data pipeline

2024-03-21 The need for data-driven insights is nothing new. Organizations are still challenged, though, to derive meaningful insights from data across multiple systems, such as systems of record, managerial systems and publicly available data. One key way to transform a mass...

Eric Thibodeaux professional photo
Eric Thibodeaux

Advancing public services: The impact of Software-as-a-Service in state and local government

2024-02-08 In the ever-evolving realm of technology solutions for the public sector, Software-as-a-Service (SaaS) cloud solutions have emerged as a transformative tool, offering efficient and secure Enterprise Resource Planning (ERP) options.

Lidija Salvaggio, CGI Federal
Lidija Salvaggio

Software bill of materials: What you need to know

2023-04-13 Cybersecurity is an endlessly challenging topic, and recently, the software supply chain has proven to be vulnerable. Executive Order 14028, which President Biden signed in May 2021, sets out a comprehensive approach to securing our digital infrastructure. The order establishes...