Remove Google Remove Government Remove Software Remove Strategy
article thumbnail

Tech Transforms podcast: Energy department CIO talks national cybersecurity strategy

Dynatrace

They’re really focusing on hardware and software systems together,” Dunkin said. How do you make hardware and software both secure by design?” These initiatives recognize that federal agencies must come together to protect the U.S. government as a whole. There’s too much work we do together,” she said.

Energy 218
article thumbnail

Plan Your Multi Cloud Strategy

Scalegrid

A well-planned multi cloud strategy can seriously upgrade your business’s tech game, making you more agile. Key Takeaways Multi-cloud strategies have become increasingly popular due to the need for flexibility, innovation, and the avoidance of vendor lock-in. Thinking about going multi-cloud?

Strategy 130
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

Tech Transforms podcast: Supply chain meets modernization

Dynatrace

He also underscores the importance of visibility when it comes to implementing government-mandated security requirements, such as the National Cybersecurity Strategy. Software supply chain attacks are on the rise. Here’s why. Listen and subscribe on our website , or your favorite podcast platform, and leave us a review !

article thumbnail

Tech Transforms podcast: A look back at some of our favorite episodes from 2022

Dynatrace

In 2022, we released 33 episodes covering a multitude of topics — from privacy issues to zero trust initiatives to American innovation — that sit at the intersection of technology, government, and human needs. Rick Stewart , Chief Software Technologist at DLT Solutions. Episode 47 – Application Management for Federal Government.

article thumbnail

What is cloud application security?

Dynatrace

Incorporating cloud application security practices is an effective way for organizations to avoid application security risks, ensure a smoothly running software development lifecycle (SDLC), and establish an overall strong security posture. However, open source software is often a vector for security vulnerabilities.

Cloud 179
article thumbnail

AI’s ‘SolarWinds Moment’ Will Occur; It’s Just a Matter of When

O'Reilly

Here’s a more likely nightmare scenario that doesn’t even require any novel technologies: State or local governments using AI, facial recognition, and license plate readers to identify, shame, or prosecute families or individuals who engage in behaviors that are deemed immoral or anti-social. If we don’t, then we are unethical, not the AI.

article thumbnail

To understand the risks posed by AI, follow the money

O'Reilly

Market structure is not simply the number of firms, but the cost structure and economic incentives in the market that follow from the institutions, adjacent government regulations, and available financing. Open source software enabled it to escape from under the thumb of the PC era’s dominant monopoly. But it is far from alone.