Sea-Air-Space 2023 Showcases Strategic Insights for the Navy

As the landscape of defense technology across the United States Armed Forces continues to advance and transform, the military must also evolve and adapt with it. At Sea-Air-Space 2023, the Navy League鈥檚 Global Maritime Exposition, key leadership from the U.S. defense industry and government technology experts came together for educational and collaborative sessions across a variety of topics. A record number of attendees gathered for the three-day conference where many vendors including 探花视频 and 45 of its partners demonstrated their technology solutions to meet military needs. Fed Gov Today joined 探花视频 on the show floor to speak with military thought leaders on staffing, cybersecurity and more.

探花视频 Sea-Air-Space Recap Tradeshow Blog Embedded Image 2023Sea Service chiefs attending the conference noted that currently, maintaining and developing the workforce is a high priority for the military as it emphasizes the role of people as resources. Defense agencies are looking to engage young, talented individuals interested in serving the armed forces.

鈥淲henever you see the defense budget start to go down鈥 lot of times you鈥檒l see training and education reduced,鈥 探花视频鈥檚 Program Executive of Navy and Defense Strategy, Mike McCalip, said. 鈥淲hat you end up with is a workforce that can be five or 10 years behind in technology.鈥 To mitigate this, McCalip sees this as an opportunity for industry vendors to 鈥渉elp [the Navy] to educate and keep their workforce on the tip of the spear when it comes to technology.鈥

Another important concept discussed at Sea-Air-Space was the Department of Defense鈥檚 shift to ever evolving Zero Trust. Throughout the conference, Sea Service chiefs and tech vendors fielded many questions and conversations surrounding cybersecurity鈥檚 role within defense strategy. Military leaders and vendors shared an eagerness to collaborate and explore opportunities for growth together in the future.

 

Check out the rest of my industry insights and highlights from the event floor at Sea-Air-Space 2023 in my full blog at

Driving Advancements for the U.S. Sea Services at WEST 2023

In the 21st century, technological security remains one of the most important features of any government agency. Military officials, Government leaders and industry professionals gathered at AFCEA鈥檚 WEST 2023, an annual and international Sea Services conference, to discuss the future of security and naval technology in the federal government. This year鈥檚 conference featured the Departments of the Navy, the Marine Corps and the US Coast Guard (USCG). At WEST, agencies showcased and reviewed IT initiatives and programs in the context of meeting the needs of the Sea Services.

Opportunities for the USMC

US Marine Corps (USMC) is an amphibious force that engages enemy forces, protects U.S. naval bases, combines armed service with their fleet and responds to global crises.

At WEST, the USMC elaborated on various steps to opportunities to ensure readiness to respond to various threats and challenges. It has:

  • Extended the MQ-9 flying range
  • Gained new approvals for bases
  • Increased funding for various subsets
  • Focused on retaining recruits

During the upcoming year, it aims to:

  • Obtain a minimum of 31 amphibious warships
  • Provide training in realistic conditions
  • Explore expeditionary contracting and pre-positioning
  • Secure continued support from Congress
  • Improve cybersecurity
  • Acquire more personnel

IT professionals from both industry and other government agencies can collaborate with the USMC to help it effectively meet these goals.

探花视频 WEST 2023 Recap Blog Embedded Image 2023How DISA IT Initiatives Support the USMC

The Defense Information Systems Agency (DISA) is a United States Department of Defense聽(DoD) combat support agency聽that provides information technology (IT) and communications support to public officials. When creating security solutions for the USMC, DISA incorporates a variety of helpful features including having all migration efforts interoperable with Zero Trust best practices. This is especially important to gaining continued federal support, as Zero Trust is a vital security model in the federal government.

Over the last year, the pilot for Thunderdome, DISA鈥檚 application of the zero trust security model, came to fruition. While its implementation has been difficult, DISA hopes to use Thunderdome to improve the lack of endpoint credential solutions in the DoD by employing conditional access policies and application security stack requirements. Additionally, DISA plans to implement SOAR鈥擲ecurity, Orchestration and Automated Responses鈥攕olutions and tools to streamline security operations. Other similar security efforts include automating security validation, implementing endpoint management and advancing micro-segmentation. DISA plans to add multipurpose team collaboration and management tools that can fulfill multiple tasks at once. By channeling increased funding into these initiatives, the USMC can solidify its technological security.

Industry Professionals Driving Innovation

The Navy, and by extension, the USMC, have three main goals in the upcoming year: modernize the department of infrastructure, drive innovation and become more competitive. The tech industry can help the USMC achieve these goals through various technological advancements.

For example, transforming cybersecurity to be rooted in military readiness can help improve the USMC鈥檚 defense, speed capability delivery and insights. Quicker capabilities are especially helpful to its goal of acquiring more warships and shifting back to a focus on maritime services. Additionally, USMC must work with agencies that maintain its own Software-as-a-Service (SaaS) tools to implement additional agile tools that can expedite processes, freeing funding for other projects. Other initiatives are to expand the department鈥檚 satellite network capabilities beyond sole usage of the cloud, to enable the USMC to access toolkits from multiple systems and to advance internal innovation. These capabilities can help create comprehensive growth in the Navy.

Through a variety of security implementations, government agencies and the IT sector can work together to make the USMC, Navy and Coast Guard as safe and effective as possible. With continued and future partnerships between the government and technology industry, the Sea Services hope to achieve long-term support that will drive fundamental and vital development.

To learn more about AFCEA鈥檚 West 2023, visit 探花视频鈥檚 Partners and Events

*The information contained in this blog has been written based off the thought-leadership discussions presented by speakers at WEST 2023.*

The Pros and Cons of Low-code in Cybersecurity Environments

In the past, new technology solutions required highly experienced developers to compile certain coding languages, understand specific technologies and utilize specialized software. On top of these challenges, traditional development platforms limited innovation. Now, organizations have a new and improved development option, which can reduce time and costs while increasing customizability, automation and growth, known as low-code platforms.

Low-code can be implemented in various ways, but in the cybersecurity realm, it is often used to automate and streamline processes, such as cybersecurity operations. Low-code platforms allow digital teams to access capabilities and customizable technologies and tools that empower them to quickly produce valuable innovations, applications, and solutions with little to no limitations. Gartner predicts that 70% of new applications will use low-code or no-code technologies by 2025. As a result, application development will shift to allow teams to focus more on assembly and integration rather than development, resulting in improved efficiency, enhanced employee satisfaction and increased productivity.

For the Department of Defense (DoD) cybersecurity professionals, low-code presents an array of benefits and challenges. While it creates agility, simplification and innovation, low-code can also introduce cybersecurity risks and vulnerabilities.

Challenges of Low-Code in DoD Environments

When implementing any new process or platform, the DoD must pay attention to overall security and identify any potential risk factors that could infiltrate the environment. The DoD faces a unique challenge when considering low-code: supply chain management and ensuring the secure execution of low-code to avoid presenting new threats to its organization. For example, borrowing and leveraging unverified code from the internet can cause significant problems among an organization鈥檚 platforms. Copying and pasting code without testing it can lead to bugs, errors and inaccuracies that can slow down and harm an environment, creating further security issues.

Tychon Low-Code Cybersecurity Blog Embedded Image 2023For cybersecurity and zero trust professionals within the industry, this idea of obtaining and launching bad content is particularly challenging as they strive to protect their organization鈥檚 operations. These groups must also be prepared to identify insider threat and guarantee security when utilizing a truly limitless customization of content like low-code. Organizations must ensure new code is protected yet unrestricted. Otherwise, they run the risk of negating the purpose of a low-code platform. Ultimately, the sources and employees creating and executing new low-code must be trusted entities to avoid problems like data leaks, exploitation and cyber-attacks.

Benefits of Low-Code in Cybersecurity

While there are clear risks, the benefits to using low-code solutions continue to make it a desirable cybersecurity option. It offers the flexibility to stay ahead of emerging threats, while simultaneously saving on costs. Ultimately, low-code development enables organizations to keep pace with an ever-changing security landscape.

  • Respond immediately to emerging threats: Local platforms help an organization to become more agile. Customized low-code content enables organizations to respond quickly when existing security tools may not be able to support the software system and prevent or stop a threat.
  • Quickly create custom features: The flexibility of low-code within local platforms allows for the creation of features to match the immediate needs of an organization instead of waiting for the release of the latest software which may or may not solve the problem. The progression of low-code implementation increases the longevity and growth of an organization.
  • Build upon low-code and local platforms to save on costs: A low-code solution along with the implementation of a local platform should be able to fulfill multiple use cases and eliminate various other tools from an organization鈥檚 toolbox. Once a local platform is implemented, limitations can be lifted and advancements or replacements can be made to older legacy systems instead of purchasing multiple new tools. This saves costs for security and asset management teams.

Eliminating Risk in Low-Code Capabilities in Cybersecurity Today

The good news for cybersecurity organizations is that they can easily mitigate low-code risks and challenges with proper access controls and a simple deployment process. Any new code created for government customers or internal purposes should undergo rigorous and reliable testing through multiple levels of technical experts within an organization to ensure quality, validity and trustworthiness. Additionally, testing in a simulation of the customer鈥檚 intended environment for that code should only be a matter of minutes, ensuring a smooth production process once the code has been executed.

If purchasing a low-code solution from a third-party vendor, organizations should investigate their internal code reviews, Quality Assurance testing and delivery methods to ensure strict standards are being met. Features such as signed content, restricted third party binary executions, and more help ensure an organization can take advantage of the numerous benefits of a low-code platform without introducing risk and vulnerabilities.

The Future of Low-Code

Today鈥檚 advanced artificial intelligence-driven technology, combined with natural language processing, enables everyday employees to create complex code by simply asking a question. The local community base within organizations now has the power to heighten efficiency, productivity and creation for their deployments with quicker, more customized low-code content. Low-code and local platform capabilities provide the freedom to create innovative solutions facilitating the growth of their business.

 

Learn more about secure, low-code cybersecurity solutions like TYCHON at

Ransomware Security Strategies

One of the first challenges in combatting ransomware is recognizing the imminence of an attack and the impact it could have on an individual鈥檚 personal organization. For 60% of companies surveyed by ActualTech Media and Ransomeware.org, they reported spending zero to four hours on ransomware preparedness per month.[] Getting collective buy-in from administrators can be difficult since the cybersecurity measures put into place cannot show their full value without being hit by a ransomware attack; however, when compared to the number and scale of attacks occurring, greater attention to cybersecurity is imperative. The provides a guiding set of principles that inform strategies for mitigating ransomware risk. Addressing ransomware starts with identification of a security program followed by protection, prevention, detection, recovery and then security improvements. Ideally companies would follow this CSF outline but in reality, for most organizations the path looks different. Due to feasibility and order of highest critical priority, many companies first establish detection and recovery methods followed by protection, prevention, and security improvement.

RANSOMWARE DETECTION AND RECOVERY

When ransomware hits an organization, the biggest immediate concern is finding the problem and returning to business operations as usual. Many resources exist to assist with this endeavor including asset management tools that automatically inventory all devices on the network and monitor for potential ways malware can get in. Implementing edge detection allows companies to be alerted and quickly identify early on if the network has been compromised and which accounts and devices require isolation and additional measures to prevent the further spread to other servers, accounts and storage units. Anti-virus programs are also helpful to monitor endpoints for indicators of compromise or malware. By achieving early detection, companies can contain the malware and reduce data loss.[] It also aids in preventing extended downtime which is very costly for operations and business reputation. Apart from the actual ransom, the downtime alone caused by cyberattacks in 2020 cost $20.9 billion to American businesses.[]

Once malware has been detected, a company鈥檚 recovery plan and preparation are put to the test. IT specialists and company administrators need to have an emergency plan in place so there are straightforward steps to recovery. Backups not only need to be created and stored off-site, but also updated on a regular basis and tested to ensure that they are a solid base for a system restoration. With most traditional backup systems, the data cannot be recovered fast enough to neutralize the ransomware鈥檚 impact on operations. Instead, a new strategy must be adopted that shifts from 200,000 files taking eight plus hours to restore via the traditional backups, to millions of files being recovered in minutes. Granular, immutable, verifiable snapshots are required to successfully recover all of an organization鈥檚 data.[]

探花视频 Ransomware Cybersecurity Blog Series Blog 3 Infographic Image 2023

The Sophos 鈥淪tate of Ransomware鈥 report indicated that 77% of healthcare organizations that did not experience a ransomware attack in 2021 attributed it to efforts such as backups and cyber insurance, which help with remediation but not prevention. This exposed an ongoing misunderstanding within the industry on cybersecurity methods.[] Obtaining cyber-insurance does not prevent future attacks; however, instituting proper security strategies does decrease the susceptibility to ransomware. Recovery tools and insurance provide support during post-breach response but ultimately, in conjunction, organizations should strive to prevent the attack in the first place which requires implementing protection and prevention. According to the Government Accountability Office (GAO), cyber-insurance is a valuable resource to employ but noted that it is increasingly harder to acquire, due to the massive volume of cyberattacks, a higher bar of entry and more requirements to gain coverage and receive payouts. This leaves organizations who do not have sufficient security or insurance to face the recovery process and expensive remediation costs alone.[]

RANSOMWARE PROTECTION AND PREVENTION

While most organizations invest in attack detection and recovery strategies, the protection aspect of the NIST CSF is equally important and an essential element to reduce the amount of recovery needed. Protection and prevention of ransomware attacks begins with establishing system routines and measures that make it more difficult for hackers to infiltrate. Through implementing Zero Trust user principles such as Multi-Factor Authentication (MFA), institutions and agencies can protect themselves by verifying the identity of employees. Poor password hygiene is one of the leading gateways to malware infiltration, making thorough employee training and password management software a baseline to reduce risk. The average user has access to over 20 million corporate files, making each employee a critical part of keeping the network safe and a huge liability if they are not vigilant and following best practices.[] Segmentation of the network to provide user-specific access to data and system resources also creates safety barriers, so in the event of an attack the entire network is not automatically compromised. Around 80% of critical infrastructure companies without Zero Trust policies experience an $1.17 million increase in breach costs bringing to an average of $5.4 million per attack in 2022.[]

Comprehensive Zero Trust authentication and data access control to limit complete access to the entire company鈥檚 files is a first step in this process. File indexing, which classifies the level of sensitivity of information contained, allows companies to better allocate resources to prioritize their protection of the most important or confidential files.[] When processes are automated through these and other resources, it eases IT teams鈥 responsibilities and reduces the chance of error. Incorporating artificial intelligence (AI) and machine learning (ML) also expedites the identification of confidential information with metadata tags, along with advanced detection of suspicious network and user activity, and thereby minimizes inefficiencies.[6]

Organizations must rigorously search for security gaps and proactively work to close them. Some other measures to incorporate include:

  • Filtering for phishing emails and providing awareness training to minimize the possibility of a user accidentally clicking a malicious link
  • Utilizing firewalls to block unusual network traffic and segment the network to impede malware system communications
  • Monitoring software licenses to ensure they are updated and systems are adequately patched
  • Removing expired and extraneous user credentials and unused legacy technology
  • Tracking vulnerabilities on devices like IoTs, OTs, and employees鈥 personal devices used for work (BYODs) throughout the entire connection lifecycle
  • Implementing Zero Trust cloud security with container scanning and proxies like a Cloud Access Security Broker (CASB) and Zero Trust Network Access (ZTNA)

RANSOMWARE SECURITY IMPROVEMENT

Following an attack, companies have the opportunity to grow and improve from the situation as well as share resources with other public and private sector companies to strengthen defenses. Incident reporting is a key strategy to prevent future ransomware incidents and a top priority for the Cybersecurity and Infrastructure Security Agency (CISA). Agencies and organizations must support each other to defend against these cyber threats that affect every industry.[]

To support this greater focus on information sharing, the took effect in March requiring a more stringent timeline and adherence to disclosing cybersecurity attacks and ransomware payments to the government. CISA also now has the authority to subpoena critical infrastructure organizations if they do not report any cybersecurity incidents within 72 hours of a cyberattack and 24 hours of a ransom payment.[]

This threat information sharing requirement along with other recent rules on reporting attack incidents strengthen organizations鈥 security posture and reduce the success rates of cyberattacks. Through these joint efforts and public-private partnerships, companies can recover faster, resume normal operations and support other businesses in the defense of their industry and the nation.[]

To assist with incorporating these cybersecurity best practices, Congress passed the which offers $2 billion to 鈥渕odernize and secure federal, state, and local IT and networks; protect critical infrastructure and utilities; and support public or private entities as they respond to and recover from significant cyberattacks and breaches.鈥[]

RANSOMWARE RISK MITIGATION

Tech modernization, while crucial to agencies and organizations鈥 survival and growth, also presents unique challenges in protecting those technologies. In their journey to securing their legacy and updated systems, companies must take the time to honestly evaluate their cybersecurity standing across the ransomware cycle and ensure their readiness to handle an attack. Utilizing NIST CSF security strategies and other resources help organizations to mitigate risk and empower other companies to learn and protect their systems. By implementing best practices and technologies to address cyber hacks and data breaches, companies are valuing both their customers and their own bottom line. Proactive cybersecurity measures are key for all companies to stem the tide of ransomware attacks and protect the continued growth of their organizations.

 

Learn about the current state of ransomware and its impact across sectors in our Ransomware Series. Visit our website to learn how 探花视频 and its partners are providing solutions to assist in the fight against ransomware.

 

Resources:

[1] 鈥淓verything You Need to Know About Ransomware,鈥 Ransomware.org,

[2] 鈥淧rotect, Detect & Recover: The Three Prongs of a Ransomware Defense Strategy for Your Enterprise Files,鈥 Nasuni,

[3] 鈥淭he State of Ransomware in Healthcare 2022,鈥 Sophos,

[4] 鈥淗ealthcare data breach costs reach record high at $10M per attack: IBM report,鈥 Fierce Healthcare,

[5] 鈥淐yber Attacks Against Critical Infrastructure Quietly Increase,鈥 Government Technology,

[6] 鈥淔our Best Practices for Protecting Data Wherever it Exists,鈥 Dell Technologies and 探花视频, /2nd-page/dell-4-best-practices-federal-data-security-protection-report-2022#page=4

[7] 鈥淩ansomware Hackers Will Still Target Smaller Critical Infrastructure, CISA Director Warns,鈥 Nextgov,

[8] 鈥淒HS Convenes Regulators, Law Enforcement Agencies on Cyber Incident Reporting,鈥 Nextgov,

[9] 鈥淩ansomware Attacks on Hospitals Have Changed,鈥 AHA Center for Health Innovation,

[10] 鈥淔ACT SHEET: Top 10 Programs in the Bipartisan Infrastructure Investment and Jobs Act That You May Not Have Heard About.鈥 The White House,

[11] 鈥淕lobal Data Protection Index 2021,鈥 Dell Technologies,

Infographic Resources:

“Ransomware and Energy and Utilities,” AT&T Cybersecurity,

EDUCAUSE 2022: Uniting IT and Education

The education landscape has continued to thrive following the aftermath of the COVID-19 pandemic. While stay-at-home orders have been lifted, education has maintained a digital component through online classes and remote-learning technology. Although online education has many benefits, it brings the concern of security breaches. To continue keeping student information secure, education leaders must adapt alongside the changes in technology. EDUCAUSE is a nonprofit association that provides a community for technology, academic, industry and campus leaders to collaborate and build together. The annual EDUCAUSE conference hosted several sessions that showcased ways to keep students engaged and secure in the new age of education.

Educational Institutions as a Hot Target for Cybercriminals

Cybersecurity deserves consistent attention within the education sector. While schools may be compliant with security standards, they can still be vulnerable. Higher education institutions are top targets as they connect thousands of staff, students and faculty members under one system.

There are several strategies IT professionals recommend that can help education systems defend against breaches:

  • Keep operating systems and software up to date
  • Employ multi-factor authentication
  • Maintain robust user training
  • Implement encryption
  • Create cloud back-ups for information
  • Maintain efficient detection and monitoring systems
  • Implement a quick incident response plan
  • Utilize external and cloud data storage

By following these steps, institutions can take the initiative toward deploying security measures for staff and students alike.

探花视频 EDUCAUSE Education Blog Embedded Image 2023Robust Cybersecurity on a Budget

Since many academic institutions still face budget constraints due to COVID-19, their cyber posture may not be their first IT priority. To enhance cybersecurity, even on a budget, institutions should:

Know their external footprint: Through the employment of third-party devices that scan the internet for web service protocol solutions, agencies can see how much of their information is public.

Identify external login flaws: Since hackers can circumvent simple tools like automatic lockout policies, agencies should identify all login portals and check major input fields for automated controls.

Identify cloud security flaws: Agencies should switch to a multi-platformed and open-sourced cloud, since it enables security posture assessments and detection of security risks.

Implement phishing education and exercises: Phishing is one of the most common ways organizations are compromised. Institutions should ensure that all employees are educated on anti-phishing policies.

Clean up network share permissions and information: By utilizing credential scans, sensitive information can be restricted to the proper personnel. Implementing a zero trust framework ensures that each user will only gain the information that they are authorized to.

Limit the success of kerberoasting: Kerberoasting leverages the functionality of service principles to encrypt user鈥檚 passwords, which can later be retrieved offline for hacking. While it is impossible to completely prevent kerberoasting, agencies that implement detection capabilities limit the exposure and effectiveness of kerberoasting.

Prevent relay attacks: Software should avoid authentication systems that can be relayed or cracked. Responder tools can be used to analyze traffic and point out vulnerabilities.

Identify active directory misconfigurations: As active directory environments mature, built up misconfigurations can cause excessive access privileges. To prevent these being misused by bad actors, institutions should implement tools that check for vulnerable certificates.

Strengthen password security: Agencies should ban easy to guess passwords, enable multi factor authentication and disable old accounts.

Avoid flat networks and lack of network segmentation: Access should be limited to those that need to know; student and faculty accounts should reside on different domains.

Fostering a Sense of Belonging for Online Students

By meeting students where they are comfortable, educational institutions can readily share information. For example, since students are familiar with their phones, when universities utilize phone apps it can help provide a unified, digital experience for higher education students to reduce complexity, fuel career readiness and stoke student success. When creating an app for an institution, some helpful features to include are:

  • Tailored experiences with custom events depending on the user
  • Information unique to students, such as a marketplace to buy and sell goods like dormitory furniture or textbooks
  • IT toolkits
  • Self-assessment tools for COVID-19 or the flu
  • Campus features such as desk or study center reservations, transit routes, dining schedule or university maps
  • In-app messaging that can be directed to groups, such as students or faculty or personal messages
  • Feedback surveys to inspire improvement

Higher Education鈥檚 Top IT Issues for 2023

As students have become accustomed to hybrid and virtual learning, their expectations for new and elevated digital experiences have increased. There are many ways to achieve this modernization, but it requires intentional effort and technology updates from education administrators. Challenges to consider when implementing technology into learning are to:

  • Ensure IT has a 鈥渟eat at the table鈥 so they can weigh in on decisions
  • Ensure privacy and cybersecurity by training students and faculty to avoid scams, shift to data minimization, address cloud migration risks and leverage contracts with cybersecurity experts and investments
  • Adapt to students鈥 interests and products familiar to them
  • Create a seamless and enriching student experience
  • Utilize student data to update technology to better empower students
  • Pursue next-generation IT support to expand and reimagine digital campus abilities

Promoting Independence Through IT

A school鈥檚 duty is to prepare students for their futures in the workforce. Oftentimes, many careers require extensive knowledge of an array of technologies. Students should show proficiency in these areas to take advantage of more opportunities in various fields. By implementing technology into everyday use, educational institutions can promote confidence in technology, problem-solving skills, time management skills and collaboration between peers.

Diversity, equity and inclusion are also vital to university standards from both a legal and moral lens. IT intersects with diversity to make enrollment and education accessible to all by analyzing existing data to revamp hiring rubrics or utilizing cross-team conferences to create inclusive policies. With these inclusions, schools can emphasize transparency and accountability.

The pandemic revealed the importance of campus communication systems expanding beyond traditional parameters. Education departments had to shift to a remote work environment that a traditional phone system could not easily support. Universities should leverage communications software to reduce costs, provide additional flexible phone capabilities and accommodate all students regardless of where they live.

Through the inclusion of technology, educational institutions can reach new heights in their accessibility and connection with students. By enhancing security and offered digital features, educators can prepare students for an ever-changing workforce.

 

To learn more about utilizing IT for education initiatives, hub to schedule a meeting and speak to a representative today.

*The information contained in this blog has been written based off the thought-leadership discussions presented by speakers at EDUCAUSE 2022.*

3 Ways to Address Developers鈥 Productivity Concerns

From modernizing software development to creating Zero Trust cybersecurity architectures, the federal government has ambitious plans for 2023. But those plans will only reach fruition by removing the barriers that get in the way of developer productivity.

Government agencies have made great strides to bring IT teams, including developers, closer together over the past few years. For example, they鈥檝e made significant investments in that are rooted in DevOps cultures. And the Department of Defense clearly recognizes the benefits of collaboration between cybersecurity and development teams, making it a core facet of the agency鈥檚 .

But as a recent Mattermost survey discovered, more must be done to break down communication and collaboration barriers that inhibit developer productivity.

Mattermost Developer Productivity Concerns Blog Embedded Image 2023For , 300 software developers were surveyed to find out what鈥檚 keeping them from being as productive as possible, and what can be done to accelerate productivity. Their responses showed that although organizations have tried to build more collaborative development cultures, there鈥檚 still some work to be done in certain areas.

Let鈥檚 dig into some of the challenges鈥攁nd what you, as a government IT professional, can do to address them.

鈥淧oor communication across teams鈥 is a big productivity challenge

Poor communication practices are the biggest obstacles to productivity and collaboration, with 29% of survey respondents citing 鈥減oor communication across teams鈥 as an inhibitor. Their biggest issues are around 鈥渓ack of process and documentation鈥 (27%) and 鈥渓ack of clarity around project prioritization鈥 (25%).

General-purpose collaboration platforms that other teams use aren鈥檛 helping. Thirty-seven percent of respondents said there are 鈥渢oo many distractions from non-developers鈥 using those tools while 25% said they 鈥渄on鈥檛 fit their workflows well.鈥

鈥淚nformation spread across too many tools鈥 (46%) and lack of integration with other tools鈥 (45%) are making it tough to collaborate and find information

Having to work with different tools is also making it difficult for developers to collaborate. Indeed, the developers surveyed said that information silos were among their biggest concerns.

These silos are making it frustrating for developers to find what they need when they need it. Thirty-two percent of respondents said they spend 3 to 5 hours per week hunting down information while 18% spent 6 to 8 hours.

Remote work 鈥渟omewhat improves collaboration鈥 but continues to be a source of tension among some developers

Remote work might be the norm, but developers aren鈥檛 entirely taken with it. Forty-three percent of respondents stated that remote work 鈥渟omewhat improves collaboration鈥 while 33% believe it makes collaboration worse.

That number is down from our 2021 survey, where more than half of respondents said that remote work was a net gain. The fact that the number has fallen is likely a reflection of the deterioration of communications practices and lack of integration, both of which contribute to poor project clarity.

What government agencies can do to improve developer productivity

Our survey respondents sent a clear message: Give us tools and processes that allow us to collaborate more effectively, break up information silos, and share knowledge easily. There are three things you can do to satisfy these needs.

  1. Invest in software built for developer workflows.

Since open source is easily customizable, it鈥檚 simple to integrate different development tools. This will make it easier for developers to share code and resources, manage workflows, and communicate with each other without interference from other teams.

  1. Create a central repository for knowledge sharing.

Having a 鈥渟ingle source of truth鈥 that developers can refer to when looking for information can save enormous time. Invest in a repository that pulls information from different teams and tools. Provide developers with greater visibility and access to the information they need to do their jobs more efficiently.

  1. Automate information sharing and workflow management.

Automatically input new information into the repository once it鈥檚 received so developers don鈥檛 have to look for it. Automate workflow processes, too, by using a system that automatically checks off tasks when they鈥檙e done, alerts developers when it鈥檚 their time to work on a project, and more. Help your developers spend less time focusing on these tasks and more time building applications.

The success of accelerated investments in software factories and modernization initiatives in 2023 will depend in large part on developers鈥 abilities to be productive. Right now, there are obstacles getting in the way of that productivity. But you can eliminate those obstacles by improving collaboration and information sharing.

 

Want to learn more about developers鈥 productivity concerns and what you can do to address them? Check out .