How to Take a Big Step Towards Zero-Trust Security
Micro-segmentation is an important step toward a zero trust-based cybersecurity. Here are some best practices.
Micro-segmentation is an important step toward a zero trust-based cybersecurity. Here are some best practices.
It’s time for agencies to set their sights on recruiting and retaining talent in 2023. How can they do that, when employees are getting choosier, competition is getting tougher and agencies are struggling with digital services?
For many supervisors, giving an annual performance review is like going to the gym: They dread doing it and it’s sometimes painful when they do, but they know it must be done. There’s no way to take all the stress out of performance reviews. But in a recent NextGen online training, two speakers from theRead… Read more »
Diversified talent makes the cybersecurity workforce stronger and more versatile. Responsive training programs can help.
We were people before we were workers. Though our work is meaningful, it’s not who we are. Our life outside of work matters, and family, health and individual pursuits are central to our well-being. When professional obligations bleed into every available moment, it takes a toll on employees’ lives, and prevents them from doing theirRead… Read more »
This online training recap offers insight on how to feel included and invested in your agency’s goal-setting process.
Agencies have plenty of data they can use to detect cyber threats. The trick is using it without breaking the budget.
Training courses are helpful, but they’re not the only way to develop new skills that prepare you for the future. Sometimes, it’s about focusing and inviting in the right people.
When it comes to generational differences in the workplace, the Golden Rule is probably not your best guide. It sounds like common sense. Why wouldn’t we treat our co-workers or direct reports the way we would want to be treated? But what you find encouraging or helpful or motivational might not resonate with your youngerRead… Read more »
Human factors are involved in 82% of cyber breaches. Here’s how to turn your “weakest link” into a “human firewall.”