When Moving Services to the Cloud, Think Data First
If your data’s a mess when you move it to the cloud, all you get is a cloud-based mess.
If your data’s a mess when you move it to the cloud, all you get is a cloud-based mess.
Protocols such as zero trust and identity management aren’t new in the world of cybersecurity. What’s new, and driving urgency, is the cyber threat landscape.
The belief that the government should treat all of its data and services as if they were exposed to the public internet might sound extreme.
It’s not uncommon for the spend management process to look like employees carrying a pound of paper expenses from one building to another. You may see some obvious pain points here.
As the lack of cyber talent impacts the security of agencies as a whole, the solution in closing this gap lies with every department in a public sector organization – not just IT and HR.
From the lobby to the living room, constituents are changing expectations about how they want to interact with their government.
Acting ethically is more than gut instinct. Ask yourself, “Am I doing things right, or am I doing the right things?” Find out how you can have more ethical acumen.
Zero trust at its best is invisible, meaning it doesn’t create barriers for work but rather enhances the user experience through intentional security practices.
When you engage with constituents or work with colleagues, you want to hear and be heard by them. But in the increasingly hybrid workplace, this can become more of a challenge.
Gen Z is the first generation to live their entire lives online. What do these digital natives want from government?
For 25 years, the Government Accountability Office (GAO) has labeled cybersecurity a high risk. But a lot has changed since it made the list in 1997.
One of the most important decisions agencies make is whom they choose to hire.
Whenever a new technology is involved, there’s a learning curve — and there’s always new technology, Robert Imhof, Consulting Systems Architect at Fortinet Federal. “It’s going to be worth investing the time and effort to learn this technology,” says . “Security professionals that can master utilizing AI in addition to their other technical skills are… Read more »
The release of AI foundation models allows organizations to take advantage of broader community investments in AI. But there’s a catch: Agencies need to tweak and train these models to meet their specific objectives, maintain privacy and ensure regulatory compliance.
Tips and takeaways from the experts on how to make the most of community surveys.
A patchwork of legacy identity management systems can lead to security gaps and provide an uneven user experience. Here’s how a modern system can overcome those limitations and provide greater flexibility and more granular controls.
If you consider yourself to be an introvert, you may have at one point come across the misconception that introverts make poor leaders. The truth is, there is a lot of value in tapping into your authentic self and using that as your leadership strength. During the most recent New Supervisors in Government Community ofRead… Read more »