Orlando’s Approach to Managing Change and Culture
Recognizing the growing threat of cyberattacks, the city of Orlando adopted key elements of zero-trust security. Here’s what officials did and how zero trust impacted city government operations.
Recognizing the growing threat of cyberattacks, the city of Orlando adopted key elements of zero-trust security. Here’s what officials did and how zero trust impacted city government operations.
At the crux of every cybersecurity strategy is an identity data management challenge: How much information does an agency need to verify the identity of an individual requesting access to network resources?
Broadly, people often mistake cybersecurity as a sprint with a finish line. But in reality, it is a continuous effort.
The software security world uses lots of complicated terminology. We break down, in simple language, some of the most important vocabulary.
Unfortunately, cyberattacks are happening more frequently across the nation. But there are ways to bolster your defenses. It begins with creating a security playbook.
A 2023 career goal may be to better familiarize yourself with some key technologies that are currently in the early stages of use in government – artificial intelligence and zero trust.
From the types of attacks that take place, constantly increasing vulnerabilities, and growing automation and digitization, it’s crucial that governments monitor their security.
Moving data to the cloud helps eliminate silos that can make constituent services both fragmented and frustrating.
North Carolina takes a whole-of-state approach to cybersecurity to help share expertise with agencies that may lack the resources to defend themselves.
Community emergency responders can have a hard time finding the caller on sprawling bases and agencies. Here’s a tool that can help.