article thumbnail

Cloud models for reducing security risks

CGI

In my first blog on this topic, I shared some of the different types of cloud security risks that emerge from cloud services themselves, the data involved in their delivery, accessing cloud services and the unique compliance issues involved with cloud computing. Blog moderation guidelines and term of use. Add new comment.

Cloud 40
article thumbnail

The time for government blockchain proofs of concept is now

CGI

General Services Administration (GSA) and other federal agencies have issued contracts for proofs of concept (POCs); the Department of Homeland Security has issued more than $1 million in blockchain startup grants; and the Departments of Defense and State have issued requests for white papers and held industry forums. Share your thoughts. .

article thumbnail

Selecting the Right Cloud SSO Solution for Your Organization

Thales Cloud Protection & Licensing

This blog will introduce access management evaluation criteria guidelines and discuss what features you should look for and what vendors to consider for your next employee access management solution. Originally developed for consumer services, the FIDO2 standard evolved and was adopted by Microsoft for Windows Hello.

Cloud 62