Analytics

Low-Tech Security: Building Trust Through Nuanced Consent

This will be the first in a short series on ways to protect end-user identities when collecting feedback or testing products. As many of us become more proficient in cybersecurity best practices, it’s crucial that we don’t forget some of the low-tech ways that we can keep identities secure and maintain trust.

Cracking Encryption: The Quantum Threat

Quantum computing offers great promise but also great risk, and current encryption standards are especially vulnerable to the quantum threat. There are actions that agencies can take today, however, to safeguard their systems.

As Agencies Journey to Net Zero, a New Type of CTO Is Needed 

The journey toward net-zero sustainability requires not only technical expertise to address the significant energy and resource requirements of high-tech solutions, but also collaboration and long-term commitment. And it calls for a new kind of chief technology officer.