How to Mitigate the Risks of Insider Threats at Your Agency
Agencies should adopt a layered security approach that combines access, identity and security event management to detect and disrupt insider threats before damage is done.
Agencies should adopt a layered security approach that combines access, identity and security event management to detect and disrupt insider threats before damage is done.
In reality, accountants in governments are often on the cutting edge and have some of the strongest business cases for incorporating emerging technologies.
There’s a lot of buzz about machine learning in government today, given its potential to improve operations, cut costs and produce better program outcomes. But what exactly is it?
President Donald Trump released his budget proposal for fiscal 2020 on Monday, and there’s plenty in it that will affect the federal workforce.
There are a few perceived challenges that agencies face related to DevOps, most notably around culture, but with the right approaches and leadership buy-in, these challenges can be overcome.
There has been a lot of buzz recently around the promise of Robotic Process Automation (RPA). If you’re a technology executive and you’re not familiar with it, you should be.
The Interagency Information Technologies Division for Maryland’s Frederick County was managing projects for 18 divisions with a mix of spreadsheets and a SharePoint environment. But this was a time-consuming process that made it hard to plan effectively around resource capacity.
DLA began implementing RPA into everyday tasks in September 2018 and plans to automate 50 processes in the first year and develop another 10 to 15.
The common trait insider threats have is their access to an agency’s internal data, IT infrastructures and security practices.
Theresa Szczurek, Colorado’s new Chief Information Officer, joined GovLoop for an interview to address how her state tackles concerns like cybersecurity, data governance and hiring and retaining IT talent.