Articles
Insights on the ideas, trends, and work shaping our industry.
How RAG Systems Can Reshape Data Retrieval in Federal IT
It is no secret that the federal government manages a vast network of data, spanning classified intelligence, operational metrics, and public records. However, processing this volume of information demands more than traditional systems—it requires cutting-edge...
Understanding FIPS 140-3: What the New Standard Means for Federal IT Security
If you've spent any time in the federal government, chances are you've heard the word "FIPS" come up in conversation. How much it comes up probably depends on your role, but you might know it as the thing that breaks your system when it's enabled, the...
Unlocking F5 APM: Beyond Authentication to Ultimate Token Translation
Unlocking F5 APM: Beyond Authentication to Ultimate Token Translation Introduction Think F5 APM is just about authentication? Think again. While most IT professionals recognize F5 Access Policy Manager (APM) as an "authentication gateway," this only scratches the...
From Shared Myths To Legal Fiction to Digital Fiction: Navigating the Future of Application Delivery
As technology rapidly evolves, the ways we secure, manage, and deliver applications are undergoing a paradigm shift. Traditional models of application delivery are increasingly inadequate to meet the demands of today's complex digital landscapes. To better understand...
Why a Superior Identity Solution is Critical for Software Factory Excellence
In the realm of DevSecOps, modern application delivery, and software factory solutions, identity management stands as a cornerstone for ensuring a seamless, secure, and efficient process. Software factories, modeled after the principles of industrial manufacturing,...
Ransomware-as-a-Service the market place you didn’t know about
We are all familiar with SaaS (Software-as-a-Service), IaaS (Infrastructure-as-a-Service), PaaS (Platform-as-a-Service), and even more specialized services like LBaaS (Load Balancer-as-a-Service) and DBaaS (Database-as-a-Service). But have you heard of RaaS -...
The Imperative of High-Quality VARs in Today’s Cyber Lanscape
As software continues to "eat the world", becoming the foundation for business innovation and operations, the technological landscape in which enterprises operate is continuously shifting. The complexity of this landscape is increased by the prevalence of modern...
Unifying Network Segmentation and SSL Decryption for ZTA
Zero trust is a security framework that challenges the traditional perimeter-based approach to network security. In the past, organizations typically relied on a trust-based model, assuming that everything within their network was safe unless proven otherwise....







