How to Address Security Vulnerabilities in the Development Cycle
State and local agencies are focused on digital transformation and cybersecurity hand in hand, with software at the heart of digital transformation.
State and local agencies are focused on digital transformation and cybersecurity hand in hand, with software at the heart of digital transformation.
The opportunities for technology to be adopted and embraced like never before is the silver lining that Sylvia Burns, FDIC CIO, sees at both her agency and the federal government at large during this crisis.
Artificial intelligence is seen as essential to getting more value out of data. But there’s a skills gap.
We put together this list of 10 federal government Twitter accounts that we think are crushing it. We’ve also provided tips you can use to boost your agency’s Twitter game.
GovLoop highlights some of the best opportunities available on USAJobs.com in a blog post each week.
Traditionally, government has viewed continuity of operations as a document. But COOP is really a process — a living, real-time activity that mitigates or addresses any disruption to a mission-critical operation or service so that it keeps running.
In adapting to the crisis, Colorado’s IT office has found itself in a position where it can accelerate its push for IT transformation because the crisis has already put transformation at the top of the agenda.
You don’t need to wait 41 years before you start thinking about the second act of your life.
There are six core capabilities of zero trust that agencies can include to modernize their security environments.
When it comes to data projects, stakeholders with limited technical expertise might think little is happening if there is nothing visual to show.