Zero Trust: What It Is and Why It Matters
By now you’ve probably heard the term “zero trust.” But what is it? And how can it help improve your security? Find out here.
By now you’ve probably heard the term “zero trust.” But what is it? And how can it help improve your security? Find out here.
Need help getting organized? Here are some tips gathered from the experts to keep your days running smoothly.
It’s that time again! The GovLoop Featured Contributor Program is now accepting applicants for its next group of writers. The program is a wonderful opportunity to write about issues on which you’re passionate, to connect with GovLoop’s 300,000+-person community, and to earn some well-deserved recognition.
To unlock your personal productivity and really get things done, you need a plan. Follow these five steps to make a weekly plan that makes your projects achievable and helps you be as productive as possible.
Software developers and malicious actors both love cloud-native applications, but for very different reasons. Here’s what you need to provide robust security for your cloud-native applications.
Sharing data through a public/private research consortium allowed Chicago to provide better early childhood services. It wouldn’t have been possible without the cloud.
North Carolina takes a whole-of-state approach to cybersecurity to help share expertise with agencies that may lack the resources to defend themselves.
Accessibility doesn’t just improve engagement for constituents with identified disabilities. It also helps make resources more available to everyone.
From the types of attacks that take place, constantly increasing vulnerabilities, and growing automation and digitization, it’s crucial that governments monitor their security.
It’s essential for employees to feel as if they belong in their workplace. The benefits are indisputable.
On the surface, to “bloom where you’re planted” seems virtuous. But is it? Probably not always. After all, you have legs not roots…
A strategic plan can be an effective tool for advancing an agency’s goals — assuming the agencies avoid certain pitfalls.
Whenever a new technology is involved, there’s a learning curve — and there’s always new technology, Robert Imhof, Consulting Systems Architect at Fortinet Federal. “It’s going to be worth investing the time and effort to learn this technology,” says . “Security professionals that can master utilizing AI in addition to their other technical skills are… Read more »
The release of AI foundation models allows organizations to take advantage of broader community investments in AI. But there’s a catch: Agencies need to tweak and train these models to meet their specific objectives, maintain privacy and ensure regulatory compliance.
Tips and takeaways from the experts on how to make the most of community surveys.
A patchwork of legacy identity management systems can lead to security gaps and provide an uneven user experience. Here’s how a modern system can overcome those limitations and provide greater flexibility and more granular controls.
If you consider yourself to be an introvert, you may have at one point come across the misconception that introverts make poor leaders. The truth is, there is a lot of value in tapping into your authentic self and using that as your leadership strength. During the most recent New Supervisors in Government Community ofRead… Read more »