How an Identity-Centric Strategy Can Drive Government Security
Identity is more than a credential — it’s the metadata that makes up the identity. Learn to use identity as the basis of security.
Identity is more than a credential — it’s the metadata that makes up the identity. Learn to use identity as the basis of security.
In Los Angeles, real-time data means homeless Angelenos can weigh in on policies that affect them.
In Fairfax County, VA, 911 dispatchers use real-time data on emergency resource to better respond to emergencies.
There are three goals of data ethics: protect civil liberties, minimize risks to individuals and society, and maximize the public good.
As government collects more data on individuals, it becomes more important than ever to guarantee its privacy.
The National Cybersecurity Strategy emphasizes a more proactive approach to cyber defense. These are some steps you can take toward that goal.
By now you’ve probably heard the term “zero trust.” But what is it? And how can it help improve your security? Find out here.
Sharing data through a public/private research consortium allowed Chicago to provide better early childhood services. It wouldn’t have been possible without the cloud.
At the Oklahoma Department of Wildlife Conservation, social media is a vital tool for outreach. And it’s fun.
Data catalogs give agencies more and better opportunities to solve mission-critical problems, avoid costly errors, and empower employees to work better.