How an Identity-Centric Strategy Can Drive Government Security
Identity is more than a credential — it’s the metadata that makes up the identity. Learn to use identity as the basis of security.
Identity is more than a credential — it’s the metadata that makes up the identity. Learn to use identity as the basis of security.
Have you heard? The GovLoop Featured Contributor Program is accepting applications for its next group of writers. The program is a great opportunity to write about issues on which you’re passionate, to connect with GovLoop’s 300,000+-person community, and to earn some well-deserved recognition.
In Los Angeles, real-time data means homeless Angelenos can weigh in on policies that affect them.
In Fairfax County, VA, 911 dispatchers use real-time data on emergency resource to better respond to emergencies.
There are three goals of data ethics: protect civil liberties, minimize risks to individuals and society, and maximize the public good.
As government collects more data on individuals, it becomes more important than ever to guarantee its privacy.
The National Cybersecurity Strategy emphasizes a more proactive approach to cyber defense. These are some steps you can take toward that goal.
By now you’ve probably heard the term “zero trust.” But what is it? And how can it help improve your security? Find out here.
It’s that time again! The GovLoop Featured Contributor Program is now accepting applicants for its next group of writers. The program is a wonderful opportunity to write about issues on which you’re passionate, to connect with GovLoop’s 300,000+-person community, and to earn some well-deserved recognition.
Sharing data through a public/private research consortium allowed Chicago to provide better early childhood services. It wouldn’t have been possible without the cloud.