A catalyst for change, the transition to “maximized telework” forced agencies to rapidly modernize their approach to IT. But how is the need for modernization affecting cyber strategies, like the adoption of zero trust?
The COVID-19 pandemic is forcing us to move and think beyond the traditional in-office perimeter to work from anywhere and collaborate in new ways. That’s why ACT-IAC, MeriTalk, and the Partnership for Public Service joined forces on Resilient: Government Pandemic Insights for a Safer America.
Against the backdrop of the Federal government’s maximized telework environment, modern, adaptive networks are more important than ever. But despite countless calls to evolve, many agencies are facing this crisis while still relying on outdated network infrastructure, like legacy Time Division Multiplexing (TDM) technology.
MeriTalk, in partnership with Cloudera, surveyed 150 Federal IT decision makers familiar with their agency’s security to examine security and governance policies in the cloud.
MeriTalk, in partnership with Cloudera, surveyed 150 Federal IT decision makers familiar with their agency’s data management in the cloud to examine data-in-motion within agencies. See how automation can help democratize data and speed decision-making – all while ensuring security and compliance.
MeriTalk and GDIT surveyed 150 Federal cybersecurity managers to explore multi-cloud cybersecurity challenges and opportunities, current efforts and aspirations, and how they can future-proof multi-cloud cybersecurity.
As the Federal government has moved to maximized telework, agencies are reexamining their bring-your-own-device (BYOD) programs to expand employees’ remote access. So, how are current security models keeping up? What steps are Feds taking to secure personal devices and what role does zero trust play?
Federal cybersecurity is more critical than ever as agencies quickly adapt to a “maximized telework” environment. But, how effective are Feds’ current cybersecurity efforts? What is working well in agencies’ cybersecurity strategies, and what needs to change?
With remote work being touted as the “new normal”, agencies are empowering their employees to work beyond the conventional four walls – increasing virtual collaboration capabilities through video calls, instant messaging, and digital conferencing. MeriTalk, Cisco, and ThunderCat partnered to document the Federal government’s journey to secure web-based collaboration. We examined how agencies are utilizing […]
Federal mandates like Cloud Smart, MGT, and TIC 3.0 set agencies on a fast track to modernization. But as IT infrastructures evolve, how are agencies turning their most coveted asset – data – into insight? What steps are they taking to address mass data fragmentation? How are data protection measures adapting to meet changing demands? […]
How are agencies preparing for the next chapter of CDM? Building off MeriTalk’s 2019 “CDM Referendum” study, “CDM: The Next Chapter” explores how the Department of Homeland Security’s (DHS) Continuous Diagnostics and Mitigation (CDM) program is evolving to protect vital cloud and mobile environments — technologies that, today, underpin Federal telework at scale in the […]
While innovation has always been at the heart of geospatial intelligence (GEOINT), the rapid and disruptive influx of artificial intelligence (AI) represents a true inflection point for the GEOINT tradecraft. AI presents unprecedented opportunity to transform the productivity, capacity, and capability of the GEOINT workforce. But how do we prepare for such a seismic shift?
Federal, State, and Local government IT leaders are quickly scaling work from home support to unprecedented levels, despite many organizations lacking needed infrastructure and security controls for a perimeterless work environment.
Artificial Intelligence (AI) for Federal agencies is a complex network of people, processes, and services. It requires high-performance computing, best-in-class networking, and maximum storage capacity. And, with so much data to quickly aggregate, manage, and analyze across devices, agencies, and locations dispersed geographically around world, agencies will need to: Identify and build a robust AI […]
While 81 percent of Federal IT decisions makers say their agency already uses multiple cloud platforms, the majority also say managing a multi-cloud environment will be one of their agency’s top challenges over the next five years. What steps should agencies take to better prepare for their multi-cloud future?
MeriTalk surveyed registrants from the 2019 AWS Public Sector Summit to understand how IT managers assess the value of their current data centers, what factors they consider when moving a data center, and the most common excuses they hear for keeping outdated data centers open.
The Federal government isn’t alone in the race to cloud adoption – state and local government (SLG) agencies are hitting the track as well. SLG IT managers know cloud must be central to their strategy as they look to pick up the pace on modernization efforts.
“Never trust; always verify,” is emerging as the new slogan for information security in a cloud-based world. At its core is Zero Trust – the idea that access to agency resources should be restricted until the user has proven their identity and access permissions, and the device has passed a security profile check.
Seven years after its inception, how is DHS’ Continuous Diagnostics and Mitigation (CDM) program performing? We surveyed more than 160 Federal and industry CDM stakeholders to understand their experiences with the program and recommendations for its future direction.
Keeping up with – or preferably ahead of – advances in technology is absolutely necessary for those involved in government IT. MeriTalk features not only the latest research affecting federal technology, but also more in-depth studies that examine how those developments are likely to impact the government IT realm.
MeriTalk federal IT research covers a variety of subjects, including how to make the best use of Big Data, the safest use of cloud computing, and other cybersecurity topics that affect all government agencies.