How States Secured the Election… And So Much More
Responsible for carrying out the election were not just poll workers and election officials, but thousands of IT staffers around the country who defended against cyberattacks.
Responsible for carrying out the election were not just poll workers and election officials, but thousands of IT staffers around the country who defended against cyberattacks.
Discover the advantages and disadvantages of how you combine different factors. If you still think a password plus an SMS text code is MFA, you really need to read this article!
Before I can demonstrate the ultimate way to secure passwords and password management, I need to first discuss the truth about MFA.
This user experience envelope gets us closer and closer to seeing and understanding what our tax dollar investments are doing, how they’re going to work, and what they’re going to look like.
Zero trust can dramatically elevate agencies’ cyberdefenses from their legacy security architectures. And industry expert shared three ways agencies can stop lateral cyberattacks.
For better or worse, our bosses aren’t going to be around forever. Here are some tips for what to do when your boss leaves.
Community engagement is an important part of how governments interact with their constituents. Learn about identifying your community engagement efforts.
What all this shapes up for is an ugly government work environment in the immediate aftermath of the election, with a few possible situations at play.
Learn about the Google Cloud Public Sector Summit, an exciting digital event that will connect government and academic communities across the globe.
Sometimes, it’s impossible to resist discussing politics with colleagues. If you’re going to do so, use these eight do’s and don’ts.