Process Automation: The Efficient Alternative to Paper-Based Systems
In this video interview, Niranjan Vijayaragavan, Chief Product Officer at Nintex, explores the benefits and “how to” of process automation.
In this video interview, Niranjan Vijayaragavan, Chief Product Officer at Nintex, explores the benefits and “how to” of process automation.
In this video interview, Gina Scinta, Deputy Chief Technology Officer at Thales TCT, discusses why quantum computing poses a threat to agency encryption standards — and how agencies should respond.
In this video interview, Kevin E. Green of BeyondTrust explores how an identity-centric approach to cybersecurity, including a modern privileged access management (PAM) solution, helps agencies secure the paths to privilege that malicious actors try to exploit.
Most of us are familiar with projects gone wrong, with delays and wasteful sidetracks. But up-front analysis can avoid those speedbumps.
Managing data is no small feat. In this video interview, Cohesity’s Marlin McFate and Swish Data’s Sean Applegate discuss how agencies can implement a simplified, cohesive approach to cyber resiliency.
Journey maps are one of the most effective and perhaps underutilized ways of understanding what constituents experience and how best to serve them.
Improving public trust and engagement doesn’t happen by chance. It requires a strategy, a clear metric for success, and data to benchmark against.
It’s that time! Apply to join GovLoop’s 2025 Featured Contributor program — a chance for government and industry professionals to share their knowledge with, and be recognized by, a community of 300,000-plus public-sector employees, industry partners, and other knowledge experts.
Frontline workers know how AI tools could improve their daily tasks better than leadership or IT specialists probably do. A grassroots approach encourages innovation from the ground up.
No state or local entity should assume that it’s too small or innocuous to undergo a cyberattack. Here’s how North Dakota prepares.