Reaping the Rewards of Multi-Cloud Environments
This report explores multi-cloud adoption in agencies, highlighting the benefits and challenges of implementing these environments.
This report explores multi-cloud adoption in agencies, highlighting the benefits and challenges of implementing these environments.
Learn more about the security considerations agencies need to keep in mind as they continue to adopt video conferencing solutions.
Sure, November is typically a busy month, with Daylight Savings wreaking havoc on us all and the hecticness of kicking off the holiday season. But making time for professional development shouldn’t get pushed to the back burner. Check out the full list of November online trainings below, and remember, all sessions are recorded — soRead… Read more »
In state and local government, where the ability to deliver high-quality programs hinges on the close collaboration of teams across an organization.
DHS has developed the Unified Cybersecurity Maturity Model, a framework that allows the agency to tie the investment dollars to the cybersecurity of programs and their component systems.
The upcoming change in administration presents both opportunities to modernize cybersecurity and AI governance in government operations and risks of heightened vulnerabilities, requiring strategic action and vigilance.
In 2022, the State Department updated its criteria for evaluating U.S. Foreign Service employees’ performance to reflect data’s growing usefulness — in all aspects of department work.
The biggest AI mistake that state and local governments make is focusing solely on its hazards, according to AI expert Alan R. Shark. He recommends an atmosphere of curiosity instead. “Let’s see what we can do.”
Section 508 requires that all government communications and information are accessible to people with disabilities. But what happens outside official communications is also crucial for accessibility.
Many agencies have some of the foundational capabilities of zero trust in place already, such as Identity, Credential and Access Management (ICAM). “What zero trust calls us to do is take all of these capabilities to the next level. That’s not a technological solution,” said Steven Hernandez of the Department of Education. “Zero trust is… Read more »
Even the most high-performing teams can benefit from an occasional “tune-up” to ensure continued collaboration, communication and skill-building.
The AI factory process now includes two new ways, or MVPs, that demonstrate the product’s value to a user.
Whenever a new technology is involved, there’s a learning curve — and there’s always new technology, Robert Imhof, Consulting Systems Architect at Fortinet Federal. “It’s going to be worth investing the time and effort to learn this technology,” says . “Security professionals that can master utilizing AI in addition to their other technical skills are… Read more »
The release of AI foundation models allows organizations to take advantage of broader community investments in AI. But there’s a catch: Agencies need to tweak and train these models to meet their specific objectives, maintain privacy and ensure regulatory compliance.
Tips and takeaways from the experts on how to make the most of community surveys.
A patchwork of legacy identity management systems can lead to security gaps and provide an uneven user experience. Here’s how a modern system can overcome those limitations and provide greater flexibility and more granular controls.
If you consider yourself to be an introvert, you may have at one point come across the misconception that introverts make poor leaders. The truth is, there is a lot of value in tapping into your authentic self and using that as your leadership strength. During the most recent New Supervisors in Government Community ofRead… Read more »