Architect a More Secure Agency
Discover how your agency can get the technical details of zero trust right by including network segmentation.
Discover how your agency can get the technical details of zero trust right by including network segmentation.
“Humanity-centered design” goes beyond “human-centered design” to look at the bigger picture surrounding applications. Here’s how that can change your approach.
It matters whether someone has a positive or negative experience transitioning from traditional, face-to-face interactions with agencies to more digital outreach. The right implementation can help.
Online training sessions for June are here – check out what’s available to learn this month.
Despite significant public support, there remains a critical, worldwide need for digital accessibility. On this year’s Global Accessibility Awareness Day, let’s go beyond “awareness for a day” and start making concrete changes.
This blurb describes discoveries by Wind Creek Hospitality (WCH) during its tech modernization journey.
A CIO’s busy schedule can sideline the critical task of technology scouting. Setting vendor “office hours” is a way to get the information without wasting time.
Here’s a quick use case of how Monroe County, Georgia, successfully left its traditional hub-and-spoke security architecture behind.
This blog covers the three must-have stages to optimize your cloud environment.
Here is a comprehensive listing of May’s professional development opportunities from GovLoop.