Delivering What the Public Expects
We interact every day with brands and services that shape our expectations of how government should engage with us. Applying for public services should be as easy as online shopping. Here’s how to get there.
We interact every day with brands and services that shape our expectations of how government should engage with us. Applying for public services should be as easy as online shopping. Here’s how to get there.
Mismanaged data can lead to poor decision-making, loss of trust, increased risk and other fallout, and artificial intelligence has made data use more complicated. Fast, secure, energy-efficient data storage, however, helps agencies manage what they have.
Executive orders, frameworks, and acts of Congress tell agencies what their cybersecurity goals should be, but generally leave implementation details to other entities. The National Cybersecurity Center of Excellence (NCCoE), a component of the Commerce Department’s National Institute of Standards and Technology (NIST), fills that need — developing actionable, standards-based guidance that helps agencies turn… Read more »
Protecting your data is the lynchpin of coming back from a cyberattack. Here are some pointers on keeping data safe.
No organization is immune to cyber breaches. But there are strategies that make effective cyberattacks less likely and that protect data on which government depends.
Agencies largely know about the equipment they manage, but the unmanaged devices are much harder to see and secure. A comprehensive, dynamic view is necessary to identify your high-value assets.
The role of data in government is growing fast. But to reach the future, you have to prepare. Here are some tactics to get your data systems ready now.
In New Jersey, officials are finding ways to make the unemployment benefits system clearer, more seamless and more compassionate. It’s the result of thoughtful, agile, evidence-based modernization.
To help close its digital divide, New York City created an innovative subsidy program that brings broadband access to hundreds of thousands of low-income residents.
Network security needs to be built in from the ground up during project development. Here’s advice for choosing the right tools.
Notifications