There are two types of applications: those that have moved to the cloud and those that have yet to move to the cloud. Bold claim? We don’t think so. In this article, we will look at how to protect your cloud-based information, some of the approaches available for doing so, and three scenarios demonstrating the securing of sensitive data stored in the cloud.
Read MoreDuring the emergence of the “cloud” in the late 2000s, the Federal government was grappling with information systems across agencies that were aging, slow, fragmented, not secure, and duplicative. In October 2018, the OMB released a Federal Cloud Computing Strategy, Cloud Smart– an update to Cloud First. What does Cloud Smart mean for your agency?
Read More