article thumbnail

US government agencies can communicate, collaborate securely with AWS Wickr

AWS Public Sector Blog

The pandemic also accelerated government agencies’ adoption of new technologies to support team collaboration and more flexible work environments, including chat, video conferencing, and document sharing. The problem is that consumer apps are designed for massive scale and extensibility, not necessarily for security.

article thumbnail

Improving software security in the public sector

Open Access Government - Technology News

UK public sector organisations are facing threats and increasingly sophisticated attacks on key infrastructure and software security This trend is only expanding as more services become digitised and complex software supply chains multiply the opportunities for malicious actors to infiltrate networks.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

How government agencies can vet external data in minutes with data interchange zones

AWS Public Sector Blog

The rapid digitalization of government services has transformed the way government agencies interact and exchange data with each other and with their communities. These data interchanges can take different forms; one example is how regulatory agencies can provide entities with a simple mechanism to ingest regulatory reporting.

article thumbnail

5 Things Government Agencies Should Know About Continuous Authentication

State Tech Magazine

The usual goal is to reduce the security risk from stolen or borrowed credentials or malware-infected workstations. Continuous authentication is a tweak to traditional authentication methods, turning log-in-at-the-start authentication into more active monitoring. Here are five things to know about this authentication method.

article thumbnail

Accelerating the secure exchange of public health data with AIMS, powered by Ruvos and AWS

AWS Public Sector Blog

However, the exchange of sensitive health data introduces many complexities, requiring specialized solutions to make sure information is shared securely and in consistent formats across organizations. and has undergone independent security assessment conducted by a third-party assessment organization (3PAO). AIMS processed more than 2.25

article thumbnail

Introducing Google Workspace security guidance to address Canadian data security requirements

Google Public Sector

The newly-released Google Workspace security guidance can help government agencies reach compliance by providing steps they can follow to introduce Google Workspace tools while adhering to the GC standards. The guidance can help Canadian teams collaborate without compromising security.

article thumbnail

What Government CIOs Should Know About US-China Security Threats

GovCast

Analyst Jack Corrigan from Georgetown University’s Center for Security and Emerging Technology (CSET) spoke to the U.S.-China China Economic and Security Review Commission Feb. national security and critical infrastructure. 1 about the risks that Chinese information and communications technology and services (ICTS) have on U.S.