Tasked to do more with less, government agencies are looking for ways to lighten the burden on overloaded IT teams while also elevating the level of citizen service. Automation offers a way forward.
Posts By Adam Stone
During a recent webinar, government and industry leaders discussed key steps agencies can take to implementing identity-centric security.
Configuration management is critical to cloud security because many products come with default settings that do not provide adequate security.
State and local governments can benefit from a “defense in depth,” or layered, approach to cybersecurity.
State and local governments may struggle today to fill positions and retain talent. Here are five expert tips on how to overcome those hurdles.
South Dakota’s cyber defense prepares for threats known and unknown.
In response to rising cyber threats, North Carolina is taking a whole-of-state approach to security, collaborating with local governments to manage risk and respond to attacks.
In the current data-driven landscape, business leaders across government need to be involved in using data. They need at least a working knowledge of the tools of data science and the ways data scientists generate their insights.
he CIS CyberMarket provides state, local, tribal and territorial agencies with the opportunity to leverage collective purchasing power with industry-leading cyber vendors.
The CIS CyberMarket provides state, local, tribal and territorial agencies with the opportunity to leverage collective purchasing power with industry-leading cyber vendors.